正規演算法 的英文怎麼說

中文拼音 [zhēngguīyǎnsuàn]
正規演算法 英文
normal algorithm
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 正規 : regular; standard; normal正規部隊 regular troops; regulars; 正規教育 regular education; proper ed...
  1. Fundamenta informaticae, 2004, 62 : 1 - 23. 10 kleine b " uing h, lettmann h. propositional logic : deduction and algorithms, cambridge university press, 1999. 11 hilbert d, ackermann w. principles of mathematical logic

    2提出了一個把ctl在有界語義下滿足性的檢測約到一個qbf quantified boolean formulas問題的滿足性的判定上,同時證明了確性。
  2. It is proven that these modified dual algorithms still have the same convergence results as those of the conceptional dual algorithms in chapter 2 and chapter 3. secondly, a dual algorithm is constructed for general constrained nonlinear programming problems and the local convergence theorem is established accordingly. the condition number of modified lagrange function ' s hessian is estimated, which also depends on the penalty parameter

    證明這些修的對偶仍具有同前兩章的概念性對偶相同的收斂性結果,我們還進一步構造了一般約束非線性劃問題的對偶,建立了相應的局部收斂理論,最後估計了修lagrange函數的hesse陣的條件數,它同樣依賴于罰參數。
  3. Predictor - corrector smoothing methods for convex quadratic programs

    凸二次劃的預估校光滑
  4. We first present a number of desiderata for an xml - based query language, and based on this criterion, we introduce the syntax of a simple core ian - guage for semistructured data and then describe four extensions that have resulted in working prototypes. second, we present the algorithm for computing the result of a regular expression on data graph with cycles, the first - order interpretation of querying language for semistructured data, and explore structural recursion and bisimulation in semistructured data and propose an efficient and systematic way to computing a bisimulation between the two graphs. we also proposed and implemented a web querying system with database features

    基於這些準則,對一個簡單的半結構數據查詢核心語言的語提出了兩方面擴充;給出了計數據圖中表達式的;對半結構數據查詢語言的一階邏輯描述、結構遞歸和數據圖的雙態模擬( bisimulation )等問題進行了研究,提出了一種判定數據圖的bisimulation;在xml數據查詢語言研究的基礎上,設計並實現了一種具有數據庫查詢特性的web查詢系統原型。
  5. Gathering fuzzy technique and model - identifying technique to processing research, fuzzy model - identifying technique, a intersecting science, has been come out, which has become hoto in this thesis, based on deeply researching the fuzzy unit - identifying and complete analysis on data of measuring well of the chandqing wushenqi district, the method of constructing self - adapting multi - dimension non - liner subjection degree function has been created without precedento based on the extraction of routine measuring well character parameters, and for adopting self - adapting method to carry through character compression, the model has been improved the performance and enhanced the convergence speed and sorted precision of the algorithm o the relation of measuring well information and the oiliness & gassiness of sandstones is fuzzy ? in the thesis, the law of max subjection degree has been studied and improved, and proved preferable effect in the practical application

    論文在提取一些常測井特徵參數的基礎上,採用自適應方對各變量多項式進行優選,減少了特徵參數間的相關性,突出了類別間的差異性,從而優化了模式的質量,提高了分類的精度。測井信息和砂體的儲集性之間的關系是帶有模糊性的,論文對模糊「最大隸屬原則」進行了研究和改進,並在實際應用中取得了較好的效果。論文成功研製了「自適應」的和軟體? ?即通過對確回判率的比較,然後對參數進行調節的辦,可將模式「訓練」到最佳狀態。
  6. An algorithm on the multiplication table of the normal basis over finite fields

    關于有限域上基乘表的一個
  7. The asteroids are the most important small bodies in the solarsystem, and they mainly lies in the two locations - a main belt between the mars ' s orbit and the jupiter ' s and the near - earth space. the most feature of the orbits of near - earth asteroids ( neas ) is that the semi - major axes of the orbits are nearly equal to that of the earth or the perihelia distances are approximate to or even less than the mean distance between the sun and the earth, thus they could move into inside of the earth ' s orbit, so that they might close approach or even colliside with the earth ( or other planets, such as the venus, the mars, etc. ). the characteristic brings about some difficulties in the numerical research during their orbital evolution, which leads to the failure of the normalization technique in the general removal impact singularities of celestial mechanics methods and the symplectic algorithm which is successfully applied to the investigation in quality. by comparing the computation effects of several common numerical methods ( including symplectic algorithm ), and considering the nature of the movement of the small bodies, the corresponding treatments are provided here to improve the reliability of the computation

    小行星是太陽系最重要的一類小天體,主要分佈在兩個區域;火星和木星軌道之間的一條主帶和近地空間.近地小行星軌道的最大特點是其軌道半長徑與地球軌道半長徑相近,或近日距離接近甚至小於日地平均距離,其運動可深入到地球軌道的內部,這將導致該類小行星與地球(還有金星、火星等)十分靠近甚至發生碰撞.這一特徵給其軌道化數值研究帶來一些困難,包括天體力學方中一般消除碰撞奇點的化處理以及對定性研究十分成功的辛都將在不同程度上失效.通過對幾種常用數值方(包括辛)計效果的比較,根據小天體運動自身的特性,給出了相應處理措施,從而可提高計結果的可靠性
  8. By analyzing the movement of maneuvering targets, the changing rule of angle vectors is summarized in the time field, and then some new vectors are introduced to modify the former residual error

    通過對機動目標運動分析,總結出角度向量在時間域中的變化律,通過引入新的計向量,對原殘差計進行了修
  9. The third part analyses several theories on interest weighing include the theories of restraint and application of jiatengyilang, the quantitative calmatives method of alexi, the layered stricture theory of liangshangshang and comprehensive weighing theory of li na. the author puts forward 4 rules in the process of weight : 1. protection of justice interest. 2

    第三部分分別對有關利益衡量則的幾種學說進行了評述,包括加藤一郎的節制和適用說,阿列克西的定量計,樑上上的層次結構理論和李娜的綜合平衡理論。在評述的基礎上,筆者提出了利益衡量適用過程中應遵循的四個則: 1 、保護當利益。
  10. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優基表示下的乘和乘逆運的快速,並對hankerson等人提出的多項式基下的乘的快速作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優基表示下的乘和乘逆運的性能,還對這兩種基表示下的f _ 2m域中元素運效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計橢圓曲線標量乘的快速,同時改進了固定基點梳形,提高了整個系統的速度,並在實驗的基礎上分析研究了流行的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的庫,在我們的庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  11. There are many decoding schemes for convolutional code, such as sequence decoding algorithm, fano algorithm, viterbi algorithm. but in fact, what ' s used widely is viterbi decoding algorithm. the viterbi decoding algorithm, proposed in 1967 by viterbi, is a decoding process for convolutional codes in memory - less channel, which takes full advantage of convolutional codes. since viterbi algorithm is proposed, it has obtained rapid development whether in theoretics or in practice and been applied to all kinds of data transmission systems, especially to digital wireless communications and deep space communications

    卷積碼的譯碼方案有很多,如序列譯碼、 fano、 viterbi,但是真模應用的還是viterbi。 viterbi譯碼是1967年viterbi提出的,它是一種對無記憶通道卷積碼進行譯碼的。它充分發揮了卷積碼的特點,因而自viterbi提出以來,無論在理論上還是在實踐上都得到了極其迅速的發展,並廣泛的應用於各種數據傳輸系統,特別是無線通信和衛星通信系統中。
  12. The algorithm and its implementation of the leading zero anticipation are very vital for the performance of a high - speed floating - point adder in today s state of art microprocessor design. unfortunately, in predicting " shift amount " by a conventional lza design, the result could be off by one position. this paper presents a novel parallel error detection algorithm for a general - case lza

    目前國際上已有很多對前導0預測進行了研究,但是出於設計方和延遲等方面的限制,大部分前導0預測都為非精確,其預測結果可能與真實加結果中前導0的個數產生一位的誤差,這個誤差需要在浮點加的后格化過程中進行修,因此反過來又增加了浮點加減的關鍵路徑延遲。
  13. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據進行處理,包括異常數據的剔除、因子分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的向推理機制的流程、以及基於事實的自動解釋機制的具體實現方;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以則類為例說明系統中具體類的實現,用偽代碼的形式描述了推理的;第五章描述了整個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
  14. The fuzzy algorithm can be summered with such formula : the fuzzy controller with revising factor is a adapting fuzzy controller. it realize self - adjusting of controlling rules on line

    模糊控制可用下式表示:採用了修因子的模糊控制器接近一個自適應的模糊控制器,實現了控制則的在線自調整。
  15. Direct algorithms of fuzzy posynomial geometric programming

    項幾何劃的直接
  16. Elementary studies parallel algorithm of posynomial geometric programming

    項幾何劃并行初探
  17. A polynomial time algorithm in positive define geometric programming with constraints

    約束定式幾何劃的一種多項式時間
  18. In the second part, a decomposition method for solving semidefmite quadratic programming with box constraints is proposed. a regular splitting of the hessian matrix of the problem is used in the algorithm. the convergence of the algorithm is proved under certain assumptions, the numerical results are also given

    第二部分把解邊界約束定二次劃問題的則分解推廣到求解邊界約束半定二次劃問題,在理論證明的基礎上還進行數值檢驗,結果說明是有效的。
  19. The latter ptda discusses the related theorems and rules ofjudgeing the root bridge and root port as well as specifing the bridge and port, makes use of many protocols such as stp, snmp and arp, eventually determines the conjunction relation between router, switches and host in the network

    討論了確定根網橋、根埠、指定網橋和指定埠的相關則和定理,確運用了stp 、 snmp 、 arp等協議,成功地確定了網路中路由器、交換機和主機之間的連接關系。
  20. Non - parameter penalty function multi - objective orthogonal genetic algorithm for nonlinear programming problem

    解非線性劃問題的非參數罰函數多目標交遺傳
分享友人