隨機數列 的英文怎麼說

中文拼音 [suíshǔliè]
隨機數列 英文
random number series
  • : Ⅰ動詞1 (跟; 跟隨) follow 2 (順從) comply with; adapt to 3 (任憑; 由著) let (sb do as he li...
  • : machineengine
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • 隨機 : random stochasticrandom
  • 數列 : progression; series; a series of numbers arranged according to a certain rule
  1. The first one : fitting together ultimate values of every dimensions in one dimension - chain one by one, educing many equations by itself, calculating results, and comparing these results of close dimension to find maximal and minimal values. the second one : projecting all dimensions on two preestablished axis, then providing the solutions to analyze whether every projected dimensions is increscent or decreasing, and synthesize the effect of every projected dimensions to close dimension, educing many equations by itself, at last calculating the result of close dimension. the third one : according to monte carlo analysis, getting every dimensions " values from every dimensions " tolerances at random time after time, simulating the actual circumstances of mass production using these dimensions, and calculating reasonable results of close dimension economically

    鑒于這類系統在各大中小型企業的廣泛應用與相對滯后的研究水平,本文提出了三種新的能切實地解決目前尺寸鏈計算輔助分析解算中存在的各種難題的設計方案,第一種方案將尺寸鏈中各組成環能取的極值組合起來,自動方程組,求解每個組合情況下的封閉環尺寸,最後比較這些結果,得出封閉環的最大最小值;第二種方案將尺寸鏈各組成環向預先設定好的兩個方向投影,之後再分析各尺寸環投影分量的增減性,並且提供了組成環兩個方向上的投影分量增減性不一的復雜情況下的解決辦法,綜合組成環各投影分量的增減性,然後自動出方程組,最後根據各組成環的投影分量以及所的方程組來確定尺寸鏈封閉環的尺寸;第三種方案以蒙特卡洛法為原理,在尺寸鏈各組成環的取值范圍內使用計算產生大量,模擬實際大批量生產中的零件尺寸分佈情況,以更經濟更合理的方式分析、計算封閉環尺寸。
  2. This paper concerns with almost all kinds of generators such as the linear, nonlinear and inversive congruential methods, fibonacci and tausworthe sequences, add - with - carry and subtract - with - borrow methods, multiple prime generator and chaotic mapping

    目前國際上關于有很多熱門的理論和方法,除了傳統的線性同余法,還有非線性同余法、 fibonacci 、 tausworthe序、進位加?借位減發生器法等。
  3. This paper reviews the history of research of long - range dependence and self - similarity in data network traffic, introduces the related concepts and discusses the physical interpretation of long - range dependence and self - similarity along with fractional brownian motion. finally, a method for generating fractional brownian motion random series is analyzed

    本文將介紹長程依賴和自相似在計算網路研究中的歷史狀況,相關學概念,給出了基於分布朗運動的計算網路業務流呈現長程依賴和自相似屬性的學和物理解釋,討論分析分布朗運動生成方法。
  4. In this paper, two questions on exetreme value theory are investigated as follows : i. the asymptotic properties of the large quantile and endpoint of a distribution : let { xi } be an i. i. d random sequence with common distribution f ( x ) which is unknown. denote mn ( k ) as the k - th maxima of x1 … xn

    本文對極值理論的兩個問題進行了探討:一、大分位與尾端點的漸近性質設{ x _ i }是來自未知分佈f ( x )的i . i . d的
  5. In this paper, chroma dc coefficients are selected as the carrier data because chroma dc coefficients are robust. also, alterable steps are used to select one part of the coefficients, so the watermark is imperceptible ; before watermark embedding, the watermark is divided into many parts, every part is individually embedded into one gop of the video, even if a gop is destroyed, the watermark can be extracted correctly, this methods promotes the robustness of the watermark ; in addition, in order to promote the security of the watermark, the user ' s id and password are used to generate chaos sequence by the chaos system which is created in this paper, later, watermark is mixed by the chaos sequence. also, the embedding position of the watermark bit is modified by one chaos sequence, so, unauthorized person can not extract or remove the watermark, since the embedding position is unknown

    本文認為,色度dc系是魯棒性非常好的參,因而選擇色度dc系作為水印信息載體,同時,採用可變的步長選擇部分系,保證了水印的隱形性;在嵌入水印時,本文採用水印信息「網格劃分」 、各子塊獨立嵌入視頻的方案,由於水印信息子塊是相對獨立的嵌入視頻中的每一相對獨立的圖組當中,即使某一圖組收到一定破壞,也能夠恢復水印信息,使水印的健壯性得到提高;此外,為了提高水印信息的安全性,在嵌入水印信息時,根據用戶輸入的id號和密碼,利用本文構造的混沌系統產生的混沌序對水印信息進行變換,同時,對每一水印信息比特的嵌入位置也採用了偽進行調整,這樣,未授權用戶不能提取水印信息,也難以擦除其中的水印信息,因為嵌入的位置是未知的。
  6. Statistical analysis of the orthogonality between images and pseudo - random sequences

    基於統計學的偽與圖像正交性分析
  7. Following, making development study from the three directions : the first one is how to reduce calculation when to use markowitz model. this text has improved the efficient frontier of markowitz model utilizing free risk assets, and reduced calculation about revenue rates " co - variance matrix utilizing single or multiple factors, and so on. the second one is to add thinking factors about, such as transaction fee, fund limitation, lowest transaction unit ' s limitation, risk measures and exchange rate risk of international portfolio securities, so as to make markowitz model closer to our country ' s practice

    接著,分三今方向對markowitz模型進行了拓展研究:第一個方向是運用markowitz模型時如何減少計算量,本文利用無風險資產來改進markowitz模型的有效邊界,利用單因子或多因子模型來減少收益率協方差的計算量等等;第二個方向是增加考慮因素,諸如交易費用、資金限制、最小交易單位限制,風險測度和國際組合證券的匯率風險,使markowitz模型更貼近我國的實際;第三個方向是對markowitz模型進行動態拓展研究,提出了將證券收益率看成是時的投資決策模型,深入研究了m ? v有效邊界資產品種增加而發生的漂移,並用解析方法和幾何圖形描述了漂移的軌跡和方向。
  8. Noise - the shadow samples are offseted from each other in a pseudo - random way, which artificially soften the borders of the shadows

    噪聲陰影采樣值的間值呈偽,將逼真地模擬陰影的邊界。
  9. The security of the algorithm is analyzed from the randomness, linear complexity of the chaotic sequence and the intensity of initial key. the results show the randomness of the key sequence pass the frequency test, sequential test, poker test, autocorrelation test, runs test, etc. and the total level is better than the binary sequence generated by the prng of delphi 7. 0, logistic chaotic system and rc4, the linear complexity comes up to the expectation, the initial key has very strong intensity

    本文最後從混沌序性、線性復雜度和初始密鑰的強度三個方面對演算法進行了安全性分析,結果表明演算法產生的密鑰序性完全通過了頻檢驗、序檢驗、撲克檢驗、自相關檢驗和遊程檢驗等5種統計檢驗方法的檢驗,而且整體水平要好於delphi7 . 0中的偽發生器、 logistic混沌系統和rc4三種方法產生的二進制序,線性復雜度達到了學期望值。
  10. All algorithms are developed with visual basic and c. in the present paper a report is given of the results obtained the tests of independence, correlation and randomness which are involved parametric test, chi ~ square test, k ~ s test, correlation coefficient test, contingency table test and runs test

    作者對產生的進行了大量的檢驗工作。其中包括獨立性、相關性、性的檢驗,涉及參檢驗、卡方檢驗、 k - s檢驗、相關系檢驗、聯表檢驗、遊程檢驗等多種方法和形式。
  11. Through the i 、 q component of ipix radar sea clutter data " s histogram analyses and by skewness and kurtosis computed, it is been shown that sea clutter amplitude is not rayleigh distribution ; through the comparison of amplitude histogram and distributed models with the same parameters, it is been shown that hh polarization clutter is lognormal distribution, whereas vv polarization is k - distribution ; at the same time the correlation function and power spectrum density are been analyzed, at last the correlation compound k - distribution stochastic sequences whose covariance matrix is been given are been generated through sirp algorithm

    文中先介紹了海雜波幅度的有關模型,通過對ipix雷達海雜波據的i 、 q分量的直方圖以及傾斜度和峰度進行了分析和計算,證明了海雜波幅度不服從瑞利分佈;使用幅度直方圖和相同參下的各種分佈模型進行比較,得出hh極化符合對正態分佈,而vv極化服從k -分佈的結論;同時對海雜波的相關函和功率譜進行了分析,最後使用sirp演算法產生了給定協方差矩陣的相關復合k -分佈
  12. Frequency code is not uniformity distribution and keeps to a probability distribution function defined by the spectral characteristics of the target of interest. the phase code is equally duality pseudo - random sequence and used to reduced the sidelobes of the signal correlation function. and the mismatch - phase sequence is corresponding with the frequency sequence one by one

    而頻率編碼為不均勻分佈,由所觀測目標的頻譜信息提取出概率密度函決定頻率編碼序的分佈;相位編碼為二元的偽,採取均勻的二相編碼,消減同頻脈沖帶來的過高的相關函的旁瓣;而失配相位為與頻率編碼相一一對應于各子脈沖中。
  13. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大的生成、採用整除小素和勒曼測試法判定素,可以生成三種不同長度的密鑰對( 256位、 512位、 1024位)來滿足不同的加密安全等級的需求;加密模塊中,選用了二進制序的乘法方法,實現了大模冪乘運算;解密模塊中,引用了擴展的歐幾里德法求逆元,並採用中國剩餘定理實現解密過程,大大提高了解密速度。
  14. On some strong laws of large numbers

    關于的若干強大定律
  15. Some strong limit theorems of random sequence based on exponential distribution

    基於指分佈的若干強極限定理
  16. The autocorrelation function of the pn code is similar to that of the white noise, which has the randomicity. the pn code phase modulation fuze just works on the basis of this characteristic. the fuse, having excellent cut - off performance of the distance and strong anti - jamming capability, is one of the radio fuze of the predominant performance

    偽碼引信是利用偽的自相關函類似於白噪聲相關函特性而工作的,這種引信距離截止特性好,抗干擾能力強,是一種性能優越的無線電引信。
  17. Represents a pseudo - random number generator, a device that produces a sequence of numbers that meet certain statistical requirements for randomness

    表示偽生成器,一種能夠產生滿足某些性統計要求的字序的設備。
  18. To repeat sequences of random numbers, call

    若要重復,請在使用帶值參
  19. Based on the theories of nonlinear finite element monte - carlo stimulation techniques, mathematical methods for generating uniformly distributed n ( 0, 1 ) random numbers are described. a comprehensive evaluation method for uniformly distributed random number is presented. some good seeds have been selected out that can be used to generate uniformly distributed random sequences with better performance

    本文以非線性有限元理論和蒙特卡洛模擬理論為基礎,描述了均勻分佈的n ( 0 , 1 )產生的學方法,並編制了計算程序,對由軟體產生的均勻分佈序性能進行各種檢驗,檢驗成果是良好的,可用於產生各種概率分佈的變量值。
  20. Then taken four kinds of maps for examples, comparing with m - sequence, their properties are calculated, verifying the advantages of the chaotic sequence generated by the new method. after this, an improved scheme is discussed - - using m - sequence to change the sequence ’ s turn and verifying that the permutation parameters have effect on improving the sequence ’ s properties. in chapter 5, monte carlo simulation method is used to test performances of our sequences ’ applications in the given model of direct spread spectrum cdma system, and results of error rate of the system are given ; the comparing resuls of performances of anti - multi - access interference and anti - multi - address interference of different pn sequence is also shown in this thesis

    本文首先對擴頻通信中常用二進制偽的產生方法、性能特點進行了總結,指出了現有二進制偽的應用局限性;其次,根據混沌非線性系統特徵,深入研究了混沌字序的產生方法;在此基礎上,提出了一種新的產生方法中間抽取法,然後,以四種混沌映射系統為例,對其所產生的混沌字序進行了偽特性實驗據分析,並與m序進行比較,結果說明了混沌字序代替傳統擴頻序的優點,同時驗證了新方法的可行性。
分享友人