窮舉方法 的英文怎麼說

中文拼音 [qióngfāng]
窮舉方法 英文
exhaustive method
  • : Ⅰ形容詞(貧窮) poor; poverty stricken Ⅱ名詞1 (窮盡) limit; end 2 (姓氏) a surname Ⅲ副詞1 (...
  • : Ⅰ名詞1 (方形; 方體) square 2 [數學] (乘方) involution; power 3 (方向) direction 4 (方面) ...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 方法 : method; means; way; technique; process; procedure; plan; device; recipe; fashion; tool; maneuver
  1. For video codec, after analyzing and researching the newest standard h. 264, an efficiency algorithm was proposed in this paper using self - feature, spatial correlation and temporal correlation to judge the encoding mode of one macro - block. through this method, the best prediction mode can be obtain before encoding, then, the coding time can be reduced dramatically with a little expense of bit - rate. for video transmission, in this paper, a transmit method was proposed using tcp / ip protocol under the environment of local networks

    首先,在分析及研究最新的視頻編碼標準h . 264的基礎上,利用宏塊自身的特點和其時間、空間的相關性來判斷宏塊應該採用的編碼模式,從而提前得到該宏塊的最佳編碼模式,新有效地克服了原標準演算式的復雜演算,在壓縮碼流只有少許增加的情況下,大幅度地提高了幀內及幀間編碼的速度。
  2. In this paper the 2k - h type straight tooth planetary gear retarder is taken as an example and a new exhaust algorithm is adopted in computer, and the layout method of the computer program is supplied

    摘要以2k - h型直齒行星傳動的設計為例,採用新的在計算機上進行設計計算,並給出了計算機程序的編制
  3. It is seen from the result of the experiment that pseudo exhaustive test with deltascan involvement is truly a simple and practical method to produce vectors for boundary scan, it is suitable for any kinds of boundary scan devices

    從試驗結果可知,偽與deltascan相結合的確是生成邊界掃描測試矢量的一個非常簡單實用的,適用於任何一種邊界掃描元件的測試矢量的生成。
  4. There are a lot of methods available to create test vector. the thesis addresses their characteristics of the methods and special structure of boundary scan circuit respectively and come to a conclusion of pseudo - exchausive testing the most rational method applied to this situation

    測試矢量的生成很多,本文在研究了各種的特性,以及邊界掃描電路的特殊結構后,採用了偽生成測試矢量。
  5. One way to compromise data encrypted with this type of cipher is to perform an exhaustive search of every possible key

    可以危及用此類型密碼加密的數據的一個是,對每個可能的密鑰執行搜索。
  6. If it takes three months to perform an exhaustive search to retrieve data that is only meaningful for a few days, then the exhaustive search method is impractical

    如果執行徹底搜索來檢索只在幾天內有意義的數據需要花費三個月的時間,那麼搜索的是不實用的。
  7. Traveling salesman problem is combinatorial optimization problem in graph theory, it has npc computation complexity, and lots of problem can transfer to traveling salesman problem. the computation of tsp is analyzed, then the hopfield network method for solving tsp is given, at last we solve 10 - citys traveling salesman problem and chinese traveling salesman problem by using chaos neural network modeling

    首先分析了旅行商問題在搜索下的工作量;其次給出了求解旅行商問題的hopfield神經網路,同時分析了利用人工神經網路求解旅行商問題所存在的問題;最後利用混飩神經網路模型求解10城市旅行商問題和中國旅行商問題。
  8. Compared with exhausitive search algorithm, the search amout is remarkable reduced by this algorithm and the algorithm is very efficiency. with the searched perfect binary array pairs and quasi - perfect binary array pairs, new perfect binary array pairs of high dimension and volume can be constructed by all kinds of construct methods

    通過與搜索演算的比較,本演算大大減少了搜索數量,具有較高的效率。利用搜索得到的最佳二進陣列偶和準最佳二進陣列偶,可以用各種構造構造出新的高維和高階的最佳二進陣列偶。
  9. In this paper we propose a design of safety algorithm for rf cards that has only 4 bit operations. this design of safety algorithm has been applied to some rf cards

    摘要提出了一種射頻卡信息安全演算的設計案。經過論證,該演算能經受2 ^ 64次攻擊,並通過了公司的測試,已在煤氣預付費系統的射頻卡中得到了應用。
  10. The basic pseudo - randomness of the generalized self - shrinking sequences family such as their least period, linear complexity and others are introduced in chapter two. in chapter three, exhaustive key attack and distinguishing attack are introduced and applied to self - shrinking sequences

    第三章討論了攻擊和區分性攻擊,這是兩種最為常規的對于每一種密鑰流序列都可以適用的攻擊,但是區分性攻擊往往比性攻擊來得有效。
分享友人