理想演算法 的英文怎麼說

中文拼音 [xiǎngyǎnsuàn]
理想演算法 英文
hypothetical algorithm
  • : Ⅰ名詞1 (物質組織的條紋) texture; grain (in wood skin etc ) 2 (道理;事理) reason; logic; tru...
  • : 動詞1 (思索) think; ponder 2 (推測; 認為) suppose; reckon; consider; think 3 (希望; 打算) w...
  • : 動詞1 (演變; 演化) develop; evolve 2 (發揮) deduce; elaborate 3 (依照程式練習或計算) drill;...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 理想 : ideal
  1. In this thesis, we study some open problems and conjectures about the linear complementarity problem. it consists of the next three aspects : firstly, we study murthys " open problem whether the augmented matrix is a q0 - matrix for an arbitary square matrix a, provide an affirmable answer to this problem, obtain the augmented matrix of a sufficient matrix is a sufficient matrix and prove the graves algorithm can be used to solve linear complementarity problem with bisymmetry po - matrices ; secondly, we study murthys " conjecture about positive semidefinite matrices and provide some sufficient conditions such that a matrix is a positive semidefinite matrix, we also study pang ' s conjecture, obtain two conditions when r0 - matrices and q - matrices are equivelent and some properties about e0 q - matrices ; lastly, we give a counterexample to prove danao ' s conjecture that if a is a po - matrix, a e " a p1 * is false, point out some mistakes of murthys in [ 20 ], obtain when n = 2 or 3, a e " a p1 *, i. e. the condition of theorem 3. 2 of [ 25 ] that a p0 can be deleted and obtain a e " a is an almost e - matrix if a is a co - matrix or column sufficient matrix

    本文分為三個部分,主要研究了線性互補問題的幾個相關的公開問題以及猜: ( 1 )研究了murthy等在[ 2 ]中提出的公開問題,即對任意的矩陣a ,其擴充矩陣是否為q _ 0 -矩陣,給出了肯定的回答,得到充分矩陣的擴充矩陣是充分矩陣,並討論了graves,證明了若a是雙對稱的p _ 0 -矩陣時, lcp ( q , a )可由graves給出; ( 2 )研究了murthy等在[ 6 ]中提出關於半正定矩陣的猜,給出了半正定矩陣的一些充分條件,並研究了pang ~ -猜,得到了只r _ 0 -矩陣與q -矩陣的二個等價條件,以及e _ 0 q -矩陣的一些性質; ( 3 )研究了danao在[ 25 ]中提出的danao猜,即,若a為p _ 0 -矩陣,則,我們給出了反例證明了此猜當n 4時不成立,指出了murthy等在[ 20 ]中的一些錯誤,得到n = 2 , 3時,即[ 25 ]中定3 . 2中a p _ 0的條件可以去掉。
  2. On the basis of the study on the speech coder algorithms, paper describe an advanced method of developing dsp system software, and as the guidlines, we developed the programme of whole decoder unit. paper stress on analysis of the ecu in decoder unit. aiming at amr algorithms disadvantage of angularity of synthetical speech, paper study on the specutral extrapolation which apply to extrapolate reflect coefficient of track model to make error conceal processing of amr. at last paper analyze existing echo cancellation algorithms using on mobile communication system

    在此基礎上,描述了一種較為先進的大型dsp系統程序開發策略,並以此為指導思,以美國ti公司c6000dsp開發平臺開發出了整個amr解碼器單元的系統程序。論文對amr解碼器的誤碼隱藏處單元進行了重點分析,針對原有合成語音自然度不好的缺點,論文研究了將譜外推應用到amr中外推出聲道模型反射系數參數進行誤碼消除處
  3. The paper analyzes the algorithm of building linear buffer zone by angular bisectrix method, then puts forward a new method for getting angular bisectrix and buffer point

    摘要分析了用對角平分線建立緩沖區的,提出了一種新的求角平分線和緩沖點的方,實踐證明其在實現方面是可行的,而且效果比較
  4. Through matlab simulations, this improved algorithm can not only achieve the same resolution ability as the conventional music algorithm in ideal conditions, but also acquire the resolution ability and estimation precision that music algorithm can ’ t obtain in the nonideal condition of so - called signal eigenvalue leakage

    通過matlab模擬,該改進方不僅可以在情況下取得和傳統music一樣的分辨力,而且在所謂的信號特徵值泄露的非情況下可以取得傳統music不能達到的分辨力和估計精度,同時一定程度上減小了運量。
  5. This article discussed ar modeling method, capon method, music method and mn method four kinds of high resolution algorithms principle and has separately made the computer simulation in the ideal situation to the above four algorithms. through the comparison, the beam width of high resolution algorithm is much narrower than conventional beamforming method. then unifies the actual utilization, discussed the influence of time delay unbalance, time domain sampling, plane wave supposition and array element with scope and phase not identically to the beamforming and made the computer simulation

    本文首先討論了ar模型、 capon、 music和mn四種高解析度的原,在的情況下分別對上述四種作了計機模擬,通過比較,高解析度的束寬比常規波束形成窄得多;然後結合實際運用時的情況,重點探討了延時失配、時域抽樣、平面波假設和基陣的幅相不一致對波束形成的影響並做了計機模擬。
  6. Three commixed still image coding algorithms are proposed based on them and such ideas as : zerotree coding, wmse ( which is based on mankind visual characteristics ), classified vector quantization with different vector structures and classification methods. the chapter gives the principium analysis, realization schemes and simulation results of the proposed algorithms

    在此基礎上,結合零樹編碼思,以及基於人眼視覺特性和分類矢量量化的思,根據不同的矢量構成和分類方提出了三種混合型靜止圖像編碼方,給出了的分析、實現方案和模擬結果,最後對本章方作出分析總結。
  7. The main research work in the thesis is as follows : ( 1 ) base on the analysis of cutting principle and tooth geometry characteristics of klingelnberg cycloid bevel gear, the formula of tooth design calculation was verified and the equation of imaginary crown gear tooth flank was deduced by establishing appropriate coordinate system

    主要研究工作和成果有: ( 1 )通過分析克林貝格擺線錐齒輪銑齒原,對其部分幾何設計進行了推導驗證,並建立了適當的坐標系推導了假冠輪的齒面方程。
  8. First this paper describes the composing and technics of drillers ; then the composing of control system based on s7 - 300plc is described ; then thinking of such characteristics of oil driller as complexity and long delay, this paper brings forward the control strategy of combining the fuzzy control with smith estimate control algorithm, and sets down the way of auto - driller based on discal hydraulic pressure brake. at last the experiment based on matlab by computer shows that the effect of this control mode is very good and all performance are famous

    首先本文闡述了鉆機的組成與工藝特點,然後描述了基於西門子s7 - 300plc的控制系統組成,然後針對傳統鉆機自動送鉆控制策略落後的缺陷,同時考慮到鉆機的復雜性、大滯后等特點,提出了模糊控制與施密斯( smith )預估控制相結合的控制策略,給出了基於液壓盤式剎車的自動送鉆智能控制策略, matlab的模擬實驗證明該控制方式控制效果良好,各方面性能指標都達到要求。
  9. In power system full dynandc simulation software, the adndttance matrixes of fault branches are adopted in the fault models to simulate arbitrary symmetrical and unsymmetrical faults, by use of contraction technique for adndttance matrix the multi - faults and the randomly occurred faults can be processed. the feature of this method is that the arbitrary multi - fault occurred in a branch can be simulated without any additional branches or buses to be added, thereby, the ca1culation efficiency and the expedience of usage are improved

    本文提出採用故障支路導納陣處復故障計,該可以對一條支路發生任意重故障進行處,而不需要增加支路或節點,克服了目前常用的電力系統機電暫態程序在處復故障時,一般要按照事先預的故障類型以及故障和操作發生的位置增加新的節點和小開關支路的問題。
  10. When these models deal with material uncertainty, there are different from basic thought and method in detail, but the reasoning has the same hypostasis and they have the same form of structure, such as the same description of knowledge " uncertainty, the same description of evidence ' s uncertainty, the same update algorithm of uncertainty and so on

    不同的推模型處問題的基本思和方有很大的差異,但不確定推的本質是相同的,都具有一個相同的結構形式,即對知識不確定性的描述,證據不確定性的描述和不確定性的更新
  11. In this paper, we apply the theory of " nature objects existed being excellent and washed out being of feebleness " to automated map generalization basing on thinking of the conditions of map use, characters of map regions and map scale. two generalization models which are called " constrained delaunay triangle net generalization model ( cdtngm ) " and " circle generalization model ( cgm ) " are created

    本文在考慮了地圖用途、制圖區域地特點和地圖比例尺等因素的基礎上,把「優勝劣汰」的思運用到了地圖自動綜合中來,並實現了「約束delaunay三角網綜合模型」和「 circle綜合模型」兩個模型。
  12. Immune clone strategy is introduced into c - means algorithm, which can effectively tackle those problems of nonstability, slow convergence and nonideal clustering that exist in ids with the traditional c - means. the experimental results reveal that the system can detect variety of unknown abnormal intrusions, and demonstrate that our combined clustering algorithm has good performance

    實驗結果證明該上述兩種有效地克服了傳統c -均值聚類在解決入侵檢測問題中的穩定性差、收斂性不好和聚類效果不等問題,並能在一定程度上檢測到未知的異常入侵行為。
  13. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設計了基於數據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思,並用分類判決樹建立了入侵檢測分類模型;其次,設計和實現了一個高性能的網路數據採集系統和網路數據預處的方案;然後,在對關聯規則挖掘和序列規則挖掘進行研究的基礎上,結合網路數據的特性和入侵檢測領域的知識對進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設計出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  14. Modeling : this thesis develops a method different from traditional techniques that begins with the cylindrical projection of a generic model and its seamless global texture map using multiresolution technique, and then automatically fit the unwrapped cylindrical projected mesh to the texture map with an improved algorithm that based on 2d morphing to specify corresponding feature points ( or lines ). finally, we propose a formula of inverse cylindrical projection to recompose the deformed mesh, and after the texture mapping a photo - realistic individual facial model is created

    採用多解析度技術構造紋無縫拼接圖,然後把三維網格模型投影到圓柱面上並展開,根據二維圖象變形技術中特徵點匹配的數學思,將匹配公式進行改進后應用於模型網格點的適配,在作了一定假設后推導出逆向圓柱映射的計公式,再將適配后的柱面網格映射回去,最後進行紋映射生成真實感的特定人臉的三維模型。
  15. With a good understanding of the physics of natural reverberation, and the fundamental operational principles of reverb processors, it is possible to quickly create the illusion of any acoustic environment you can imagine

    很好地解自然混響的物特性,以及混響效果器的基本運則,能幫助你很快的幻出所有假的聲學空間。
  16. The development of mechanized mathematics goes through tortuous way in the western countries, written calculation is the most compute means. the mechanized degree of writing calculation is lower, and not meet the actual demands. other means, example : table calculation, slide rule, graphic solution, are invented to make up the defect of writing calculation

    由於西方比較崇尚公化數學,不易到要從筆在機械化方面存在的缺陷上尋求改進方向,以選擇和設計;而是另外尋找別的計方式、工具,如表、計尺和諾模圖等來解決應用計問題,走了彎路。
  17. This article canvass the status quo of the archive ' s automatization administration and the develop status of data mining, and discusses how to combine the data mining technology with the archive work from data cleaning means, data mining arithmetic, and data storage etc. and this article put forword a data mining syst em design idea. this article ' s structure is : first, in allusion to the archive data status quo, the pretreatment work of archive data that include data quality evaluation, data cleaning and data commut - ation process is bringed forword ; second, in the process of realizating data mining, the article discusses conception description, association rule, class three familiar means of applicating data mining, also put inforword the concrete arithmetic and the program design chart, and discusses the range and the foreground of all kinds of arithmetic when they are applicated in the archive ; third, the base of so you say, this article also discusses the importance of the archice applicate data storage and the means of realizing it ; last, the article discusses seval important problem of realizing an archive data mining system from data, diversity, arithmetic multiformity, mining result variety and the data pretreatment visibility, mining object descriptive visibility, mining process visibility, mining result visibil ity, user demand description and problem defining etc aspect. the article ' s core is how to import data mining technology in the archive work

    本文評述了檔案自動化管現狀和數據挖掘技術的發展狀況,從數據清洗方、數據挖掘、數據倉庫的建立等方面論述了如何將數據挖掘技術與檔案工作相結合的具體思路,並提出了一個數據挖掘系統的設計思。文章首先,針對檔案數據的現狀,提出了應對檔案數據進行預處工作,包括數據質量評估、數據清、數據變換和歸約等過程;其次,在具體實現數據挖掘過程中,本文結合檔案數據的特點探討了概念描述、關聯規則、分類等三種常見挖掘形式的實現方,提出了具體的實現和程序設計框圖,並論述了各種在檔案工作中的應用范圍及前景;第三,在上述基礎上,又論述數據倉庫在檔案數據挖掘中的重要性並提出了實現一個檔案數據倉庫的方;最後,從處數據的多樣性、的多樣性、挖掘結果的多樣性、數據預處可視化、挖掘對象描述的可視化、挖掘過程可視化、結果顯示可視化、用戶需求的描述及問題定義等幾方面討論了實現一個檔案數據挖掘系統的幾個重點問題。全文以探討如何將數據挖掘技術引入到具體的檔案工作實踐中為核心。
  18. So it is very important to investigate the inverse time characteristic of microprocessor distance protection. this paper emulates all kinds of faults of transmission lines by using emtp, and gets relative current and voltage sample values. then many distance protection thoughts and algorithms are adopted to compare each inverse time characteristic, better arithmetic and set thoughts are got

    本論文應用emtp進行輸電線路各種故障情況的模擬,采樣取得保護相關的電壓、電流數據;採用各種距離保護思,採用c語言進行計,比較各自的時限特性,得出反時限特性比較好的及其整定思路;對于各種故障情況,應用相關整定思路進行離線計,得出各種原的時間距離特性。
  19. Parking guidance system, which aims at promoting the efficient utilization of park lots and nearby roads, utilize advanced gps, computer, electronics, communication and gis to realize collection, transmission, processing and real - time distribution of parking information. pgs can provide drivers with the location, using status, type of parking lots near the destination, the travel route to these parking lots and related road traffic information via many method, such as vms, broadcasting, telephone, internet, in - vehicle equipment, to guidance drivers to park conveniencely and reasonably. pgs can reduce the additional traffic volume, traffic congestion, time and energy wastage, environment pollution due to searching parking space blindly, promote the utilization rate of parking lot, enhance economic benefit, social benefit and environment benefit, upgrade the level of urban traffic information services

    具體研究內容如下: 1 、利用bp神經網路及其兩種改進實現了有效停車泊位預測; 2 、提出了基於停車場選擇的停車誘導路徑優化思; 3 、總結了國外停車泊位預定技術的研究現狀、停車預定模型,並設計了停車預定功能實現的物框架; 4 、給出了可變信息板信息發布的發布策略,並提出了停車場「空、滿」狀態判定方; 5 、闡述了各種高效的信息傳輸方式在停車誘導系統中的應用框架,給出了基於gprs的停車誘導系統通信方案設計。
  20. Having studied the overall framework of the existent search engine system, we adopted the idea of trade - off algorithm to process the three - level index structure of chinese character for the implementation of chinese boolean operation, according to the different expression between chinese and english. this can greatly enhance the speed and veracity of chinese query

    通過對源代碼的分析,我們在保持原搜索引擎總體設計不變的情況下,在原有功能基礎上,針對中英文信息表達的區別,對中文漢字的三級索引結構採用折衷處來實現中文布爾查詢功能,以提高中文查詢的檢索速度和準確性。
分享友人