隨機序列產生 的英文怎麼說

中文拼音 [suílièchǎnshēng]
隨機序列產生 英文
random sequence generation
  • : Ⅰ動詞1 (跟; 跟隨) follow 2 (順從) comply with; adapt to 3 (任憑; 由著) let (sb do as he li...
  • : machineengine
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • : Ⅰ動詞1 (人或動物的幼體從母體中分離出來) give birth to; be delivered of; breed 2 (創造財富; 生...
  • : Ⅰ動詞1 (生育; 生殖) give birth to; bear 2 (出生) be born 3 (生長) grow 4 (生存; 活) live;...
  • 隨機 : random stochasticrandom
  1. According to the least twin multiplication to calculating the sensitivity index in several water production functions. thus, the writer obtains the fitted the value of the sensitivity index and the varied rule. at the same time, the writer puts forward a new method named rag a ( real coding based accelerating genetic algorithm ) and combines raga with dpsa to calculating the best irrigation system under the non - sufficient irrigation of well irrigation rice in sanjiang plain

    根據《水文學》理論中的時間分析法,建立了適合三江平原井灌水稻需水量預報的非平穩時模型;通過分析降雨特性,選定季節性時模型,建立了適合三江平原井灌水稻降雨預報的月平均降雨模型;根據最小二乘法,計算出幾種常用水分函數中的敏感指數及敏感系數,進而得到三江平原適宜採用的水分函數漠型及模型中敏感指數的變化規律;本文提出遺傳動態規劃法( raga ? dp ) ,即採用改進的基於實數編碼的加速遺傳演算法( realcodingbasedacceleratinggeneticalgorithm ,簡稱raga )與動態規劃法( dpsa )相結合,推求非充分灌溉條件下三江平原井灌水稻的最優灌溉制度。
  2. At first, 1. 67 u g per well mcab all was coated on three wells of a plate, and then 1. 5 x 1011 phage virion was diluted and added, after incubating with the target, wash away unbound phage by tbst ( 0. 1 % tween - 20 ), the bound phage was eluted with ph 2. 2 tris - gly buffer and amplified, the specially bound phage was enriched by taking through addition binding / amplification cycles. ln the following cycles, the stringency of panning can be increased by raising the concentration of tbst or decreasing that of mcab all, collecting and titering the washing phage of last time and output phage in each round, the selective ratio and the false positive rate of each round were worked out, the gradually increasing of selective ratio and decreasing of positive rate shows that the panning was effective. after 4 rounds of panning, 11 phage clones were selected after competitive - ellsa, the dna samples of 8 positive clones and 1 negative clone were sequenced and all the foreign peptides inserted was also deduced, a clear consensus binding sequence emerged

    在本實驗中,利用12肽庫對抗豬瘟病毒( classicalswinefeverviruscsfv )糖蛋白me2的單抗a11進行表位篩選,經過四輪篩選以後,挑取11個克隆作競爭- elisa檢測,結果表明,所挑11個克隆中,有9個克隆能對me2蛋白和a11反應抑制作用,抑制率最高可達64 ; dna測以後經過dnastar軟體分析,發現它們的核心為anwralsl ,該核心與豬瘟病毒e2蛋白的28 - 35位氨基酸ttwkeysh具有同源性;夾心- elisa檢測和western - blotting試驗均證明所挑陽性克隆能被a11所識別;人工合成含核心的多肽經間接elisa試驗證實,也能被a11識別。
  3. The method generates a random sequence to identify the original recipient of the document by user register. then it uses the crc error coding technique to form a watermark sequence

    即通過用戶信息注冊,與文本對應的一個偽號,加入crc糾錯碼后,形成水印
  4. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系數是魯棒性非常好的參數,因而選擇色度dc系數作為水印信息載體,同時,採用可變的步長選擇部分系數,保證了水印的隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印的健壯性得到提高;此外,為了提高水印信息的安全性,在嵌入水印信息時,根據用戶輸入的id號和密碼,利用本文構造的混沌系統的混沌對水印信息進行變換,同時,對每一水印信息比特的嵌入位置也採用了偽進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未知的。
  5. In this paper, we first analyze the input and output as well as cost - benefit rate of chinese livestock industry by the example of hog, beef, mutton and dairy cow. then, we choose the samples from different regions in different time, use the stochastic production frontier suggested by battese and coelli ( 1992 ), which is aimed at the panel data ( balanced or unbalanced ), and make the econometric analysis for the growth of hog, beef, mutton, and dairy cow. different from the former research for livestock industry, the efficiency measurement theory is introdiced into the growth model and the tfp is dissolved into technical advancement, technological efficiency and residual, the translog production function is used to make the estimation more precised

    本文首先以豬,肉牛、肉羊和奶牛為例對近年來我國畜牧業的投入出和成本收益狀況進行了分析,然後採用battese和coelli在1992年提出的針對混合數據( paneldata )的邊界函數形式,在不同地區選取一定的樣本,利用樣本省的時間與截面混合數據,對豬,肉牛,肉羊和奶牛的增長因素進行了分析,與以往對于畜牧業增長研究不同的是,將效率測算理論引入增長模型,把全要素率分解為技術進步、技術效率和殘差項,並採取了更加符合實際的超越對數函數形式,使傳統上使用的索洛余值法得到改進,更深層次的剖析了我國畜牧業目前的增長方式。
  6. The algorithm have the good one - way property, high sensitivity to initial values and good security due to the intrinsic characteristic of chaotic system and rijndael algorithm. the simulation experiment demonstrates the convenience and good hash performance ; 3 ) a new scheme of digital voice secure communication was proposed based on chaotic modulation without additional synchronization. the modulation sequence generated by chaotic logical mapping was used to encrypt the digital voice signal

    混沌系統和rijndael演算法的固有特點使該演算法具有較好的安全性、對初值有高度的敏感性以及較好的單向性能,並且易於實現,是一種有效的單向hash函數; 3 )研究了一種無需同步的基於混沌調制的數字語音保密通信系統的方案,利用邏輯映射混沌調制,以該作為密碼對數字語音進行加密處理,為了更好的隱匿信號特徵,混沌調制在小波分解的基礎上,對不同的通道使用不同的參數進行,並借鑒混沌掩蓋對信息信號進行了限幅處理,使密文完全化。
  7. Following, making development study from the three directions : the first one is how to reduce calculation when to use markowitz model. this text has improved the efficient frontier of markowitz model utilizing free risk assets, and reduced calculation about revenue rates " co - variance matrix utilizing single or multiple factors, and so on. the second one is to add thinking factors about, such as transaction fee, fund limitation, lowest transaction unit ' s limitation, risk measures and exchange rate risk of international portfolio securities, so as to make markowitz model closer to our country ' s practice

    接著,分三今方向對markowitz模型進行了拓展研究:第一個方向是運用markowitz模型時如何減少計算量,本文利用無風險資來改進markowitz模型的有效邊界,利用單因子或多因子模型來減少收益率協方差的計算量等等;第二個方向是增加考慮因素,諸如交易費用、資金限制、最小交易單位限制,風險測度和國際組合證券的匯率風險,使markowitz模型更貼近我國的實際;第三個方向是對markowitz模型進行動態拓展研究,提出了將證券收益率看成是時的投資決策模型,深入研究了m ? v有效邊界品種數增加而發的漂移,並用解析方法和幾何圖形描述了漂移的軌跡和方向。
  8. After that, a new method based on the noise to generate a random number sequence is put forward

    然後,提出了利用小波(包)進行信號分解的方式
  9. Through the i 、 q component of ipix radar sea clutter data " s histogram analyses and by skewness and kurtosis computed, it is been shown that sea clutter amplitude is not rayleigh distribution ; through the comparison of amplitude histogram and distributed models with the same parameters, it is been shown that hh polarization clutter is lognormal distribution, whereas vv polarization is k - distribution ; at the same time the correlation function and power spectrum density are been analyzed, at last the correlation compound k - distribution stochastic sequences whose covariance matrix is been given are been generated through sirp algorithm

    文中先介紹了海雜波幅度的有關模型,通過對ipix雷達海雜波數據的i 、 q分量的直方圖以及傾斜度和峰度進行了分析和計算,證明了海雜波幅度不服從瑞利分佈;使用幅度直方圖和相同參數下的各種分佈模型進行比較,得出hh極化符合對數正態分佈,而vv極化服從k -分佈的結論;同時對海雜波的相關函數和功率譜進行了分析,最後使用sirp演算法了給定協方差矩陣的相關復合k -分佈
  10. Discuss the methods to generate pseudo - random sequences and property of them ; 2

    討論了偽方法及其性能分析; 2
  11. Our approach employs a fast estimation methodology in order to avoid exhaustive search and to speed - up the calculation process

    因此假設在混合bist方法中,我們將會為偽隨機序列產生器選擇最好的特徵多項式。
  12. The third chapter " essay of emh on chinese stock market " tested the hypotheses for the emh on chinese stock market, presented that stock price and return rate variance and voiatiiity are not stable. the chapter provided some evidence for the non - - normai

    第二章分析了有效市場理論的背景,就有效市場理論成立的基本假設進行了檢驗,提出股票價格收益是不穩定的,收益分佈不是正態分佈,股票價格收益表現出非性,自相關性,異方差性。
  13. In the part of voice encryption, spatiotemporal chaotic system ( ocoml model ) and lfsr are used to generate multidimensional pseudo - random sequence. this sequence has a longer period, better randomicity, passing the verification of fips 140 - 2 security requirements. using the key stream generated by it to encrypt the voice gets a better security

    在語音加密方面,本文利用時空混沌系統(單向耦合映象格子模型)與線性移位寄存器了高維的偽,該周期很長,具有更強的性,通過了fips140 - 2的安全性能驗證,利用其作為密鑰流對語音信號進行加密,獲得了更高的保密性。
  14. Then taken four kinds of maps for examples, comparing with m - sequence, their properties are calculated, verifying the advantages of the chaotic sequence generated by the new method. after this, an improved scheme is discussed - - using m - sequence to change the sequence ’ s turn and verifying that the permutation parameters have effect on improving the sequence ’ s properties. in chapter 5, monte carlo simulation method is used to test performances of our sequences ’ applications in the given model of direct spread spectrum cdma system, and results of error rate of the system are given ; the comparing resuls of performances of anti - multi - access interference and anti - multi - address interference of different pn sequence is also shown in this thesis

    本文首先對擴頻通信中常用二進制偽方法、性能特點進行了總結,指出了現有二進制偽的應用局限性;其次,根據混沌非線性系統特徵,深入研究了混沌數字方法;在此基礎上,提出了一種新的方法中間抽取法,然後,以四種混沌映射系統為例,對其所的混沌數字進行了偽特性實驗數據分析,並與m進行比較,結果說明了混沌數字代替傳統擴頻的優點,同時驗證了新方法的可行性。
  15. ( 2 ) a new digital frequency - hopping communication system based on cipher - quasi - chaotic sequence is proposed, which combines the cryptography and frequency - hopping technology. the system ' s protocol, base - band signal processing and modulation / demodulation algorithms of the radio - frequency part are designed, and the hardware experiment conducted on a prototype of the system show that the system functions well. the finite precision problem arising while taking use of chaotic signal to generate pseudo - random sequence is studied and the anti - tracking capability of the cipher - quasi - chaotic sequence is studied with the volterra - tls method proposed in this dissertation

    ( 2提出一種新的基於密碼準混飩的密碼與跳頻技術相結合的跳頻通信系統,並且進行了協議部分、拂信號處聊分、射頻調制解調演算法部分的模擬研究和系統的硬體實驗研究;研究了利用混飩信號的有限精度實現問題,利用本文提出的m業肚m 113方法對密碼準混飩的跳頻碼的抗鵬干擾能力進行了模擬實驗研究。
  16. The states of the art of dvd protection are described, and two protocol ( cprm and dtcp ), which is proposed by w09 group, are introduced. a novel fragile watermarking approach and related tamper detection are proposed. taking still image as an example, the watermark are embedded in the discrete wavelet domain of an image, so tamper detection is possible in localized spatial and frequency regions

    第7章探討了水印演算法設計與水印應用系統設計間的區別,指出水印系統的實用性不僅僅取決于技術上的完善,同時也需要具有完備的協議;提出了一種二維偽方法;討論了影響水印系統性能的主要因素及解決方法;舉例說明了完整水印系統的設計過程並嘗試提出了一種完整水印系統協議。
  17. In this paper, we use computer to generate pseudo random number and low - discrepancy sequences. on this foundation, monte carlo integration and quasi - monte carlo integration are researched

    摘要在本文中,我們利用計算分別了偽和低差異數。在此基礎上,我們研究了蒙特卡羅積分與擬蒙特卡羅積分。
  18. This thesis is focoused on the pn sequence of direct spread cdma communication system, including it ' s generation and properties analyzing. at first, this thesis expounds linear - shift - register sequence and chaotic sequence, and calculates the value of their main properties

    本文的研究的是直接擴頻的碼分多址( codedivisionmultipleaccess ,簡稱為: cdma )通信系統中的偽技術,包括它的方法和性能分析。
  19. In the paper, i employ the theory of finite element of steel frames and monte carlo method, describe the production method of the random variable of the average - distribution n ( 0, 1 ) and write program with fortran 90. the random numbers is tested in many ways for its quality ; the result is good. they can produce random with all kinds of probability distribution

    本文以半剛性連接的鋼框架的有限元理論和蒙特卡洛模擬理論為基礎,描述了均勻分佈的n ( 0 , 1 )數的數學分法,並編制了計算,對由軟體的均勻分佈數性能進行各種檢驗,檢驗成果是良好的,可用於各種概率分佈的變量。
  20. Key management is critical technic of realizing database encryption. in this dissertation, after analysing and comparing several popular key managemet scheme. we make improvement of two - phase key management scheme according to the matter of fact, and achieve two - phase key management scheme from user key to user class key and to data class key, through creating system table in database. at the same time, we work out key using sequence of chaotic nonlinear system. chaotic sequence is complex and recalcitrant to analysis and unpredictableness, and it can offer good complexity and comparable randomness. experiment result proves that using chaotic sequence can create good key

    本文首先分析比較了幾種常用的密鑰管理方案,然後針對應用的實際情況,對兩級密鑰管理方案進行了改進,通過在數據庫中建立系統表實現了由用戶密鑰得到用戶類密鑰、以及由用戶類密鑰得到數據類密鑰的兩級密鑰管理。同時,本文利用由混沌非線性系統迭代成密鑰。混沌結構復雜,難以分析和預測,能提供很好的復雜性、類性。
分享友人