theory of algorithms 中文意思是什麼

theory of algorithms 解釋
演算法理論
  • theory : n. 1. 理論,學理,原理。2. 學說,論說 (opp. hypothesis)。3. 推測,揣度。4. 〈口語〉見解,意見。
  • of : OF =Old French 古法語。
  • algorithms : 演算法式
  1. We analyze the principle of pollard rho - method and parallel collision search method using graph theory and algebra, and obtain important principle of directing the design of algorithms directed by this principle, we redesign the two algorithms, and achieve more efficient effect

    用代數和圖論的方法深入分析了pollard演算法和并行碰撞演算法的原理,獲得了指導演算法設計的重要原則,在這個原則的指導下,重新設計這兩個演算法,取得了更好的計算效果。 2
  2. Later on we discuss the basic theory of multi - rate signal processing, and the polyphase algorithm for interplation filter, then produce the efficient algorithms for interplation : half - band filter and cic filter. we analyze their computing quantity and performance, especially the mirror elimination feature and the at - tenuation in the passband

    之後討論了多速率信號處理的基本理論,比較了不同的內插演算法,分析了半帶濾波器和cic內插濾波器的計算代價、時頻性能,以及各自的抑制鏡像特性。
  3. To better elucidate the following critical problems - - building the rational mathematics model and searching the effective algorithms, this paper sets forth the basis of algorithms and heuristic algorithm. meanwhile it compendiously introduces the main principles of genetic algorithm and the stimulated annealing algorithm, principal parameters during the course of solving problems and vertex coloring theory

    為了更好地說明下文所要解決的關鍵問題? ?建立合理的數學模型和尋找有效可行的演算法,本文闡述了演算法和啟發式演算法的理論基礎,並扼要地介紹了遺傳演算法、模擬退火演算法的主要思想和在解題過程中應用的重要參數,以及圖的著色理論;及其在作業計劃編制中應用的可能性。
  4. In this dissertation, some algorithms and techniques of digital beam forming ( dbf ) of the conformal array are studied and also adaptive digital beam forming ( adbf ) of uniformity circular array ( uca ) based on wideband signal is investigated. this dissertation is organized as followed. in the first part of dissertation, the basic theory of conformal array is introduced

    本文研究了共形相控陣的數字波束形成技術,對共形陣的相關技術進行了詳細介紹,並且對一些常規共形陣的數字波束形成技術進行了研究,得到較好的模擬結果,此外,還對寬帶共形陣數字波束形成技術及性能進行了討論、模擬及其性能分析。
  5. In recent years, nonlinear methods have attracted more and more attention and there have been some successful cases, such as median filter, mathematical morphology, etc. as a preferred way to inverstigate nonlinear numerical problems, the continued fractions method can effectively express the gradually changing data or abrupt data, so it is meaningful to study image processing by means of the continued fractions theory and algorithms

    近年來在圖像處理領域,利用非線性方法進行圖像處理取得較好效果的有中值濾波、數學形態學等,非線性方法已引起越來越多研究者的重視。作為研究非線性數值問題的首選方法?連分式方法,不僅能反映數據的漸變性,也能反映數據的突變性。鑒于這些原因,本文將連分式插值和逼近引入到數字圖像處理領域,開展了圖像插值、圖像重建等方面的研究。
  6. Based on the theory of retrieving lst through satellite remote - sensing and the characters of semi - tropical climate, topography, vegetation and the noaa / avhrr data in guangxi, the split - window algorithms for retrieving the lst from space, including the kerr algorithm, the becker & li algorithm, the qin algorithm, the franca & cracknell algorithm and some others, were analyzed and compared

    根據利用衛星遙感資料反演lst的理論方法,結合廣西現有的衛星資料及亞熱帶氣候、地貌、植被等特點,對國內外的kerretal演算法、 becker & li演算法、 qinetal演算法和franca & cracknell演算法等10多種反演lst的分裂窗演算法及其相關的參數估算方法進行了適用性分析,得出採用輻射率模型中的beckerandli演算法計算廣西白天的lst比較適用。
  7. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  8. In this paper, the method of digital evolvable hardware is studied based on the dynamical reconfiguration of field programmable gate array ( fpga ). in the paper, firstly, the basic conception and theory of ehw are roundly introduced and the structure characters of ehw chip are analyzed. secondly, the thought of standard evolutionary algorithm is discussed and the flow of improved evolutionary algorithms is analyzed

    本文首先較全面地介紹了硬體演化技術的基本概念和原理,分析了演化硬體晶元的結構特點;其次,討論了標準演化演算法的思想並對改進型演化演算法的流程進行了分析;然後著重分析了演化硬體實現中的關鍵技術,對其實現方案進行了深入的研究,文中分別採用外部演化和內部演化兩種方式對不同的應用電路進行了演化。
  9. First, in virtual of identification of flaws is a typical of in - verse problems, proceeding from time - harmonic electromagnetic maxwell ' s equa - tion and helmholtz equation, the uniqueness and existence of direct scattering problems including the numerical algorithms of diverse of boundary conditions is given. second, the uniqueness and existence of inverse scattering problems and the theory of ill - posed integral equation are briefly looked back upon. finally, indicator function method for boundary identification is set up under all kinds of boundary conditions for inverse scattering of homogenous and inhomogenous objects, meanwhile, the proof of possibility for near - field measurements and nu - merical simulation are given

    由於缺陷的識別是一類典型的反問題,因而首先從時諧電磁maxwell方程和helmholz方程出發,具體地闡述了求解正散射問題的有關方法,包括各種(夾雜)邊界條件下的數值解法,就解的存在性唯一性給予了肯定的回答;隨后對逆散射問題的理論作了簡短的回顧,包括解的唯一性以及非線性不適定積分方程的處理等;然後對均勻介質和非均勻介質的逆散射問題建立了在各種邊界條件下的邊界識別的指示函數方法,鑒于近場數據獲得的重要性,對近場測試時邊界識別的方法給予了相應的證明,並且實現了數值模擬。
  10. The database information encryption algorithms based on the theory of private homomorphism is structured based on the mathematic theory of polynomial homomorphism

    以數學中多項式同志理論為基礎,研究了秘密同態加密演算法。提出了基於秘密同態理論的數據庫信息加密演算法。
  11. Then, based on the theory of discrete fourier transform, discrete cosine transform and discrete wavelet transform, two invisible image watermarking schemes in transform domain are proposed, one is circular symmetric spread spectrum digital image watermarking based on chaotic sequences, the other is the hybrid image watermarking based on wavelet decomposition and discrete cosine transform. finally, the good performance of the two algorithms is verified by some common image processing and attack experiments

    在分析了dft 、 dct 、 dwt的理論與演算法的基礎上,提出了兩種基於變換域的圖像隱形水印方案? ?基於混沌序列的圓對稱擴頻水印方案和基於小波分解和餘弦變換結合的水印方案,並通過一些常見的圖像處理及攻擊實驗驗證了這兩種演算法生成水印的性能。
  12. ( 3 ) the theory of morden optimal control is used for the controller design of the active vibration isolation system. two algorithms, instantaneous optimal control and linear quadratic gauss optimal control, have been discussed and compared. an instantaneous optimal closed - loop control algorithm in structural space is derived by using the newmark scheme

    ( 3 )應用最優控制理論設計控制器,對瞬時最優控制和線性二次型gauss ( lqg )閉環控制方法進行研究和對比,並導出構形空間內的瞬時最優閉環控制演算法。
  13. The theory of genetic algorithms and fuzzy control theory as well as combination way of the two are discussed emphatically

    文中著重研究了遺傳演算法理論,模糊控制理論以及二者的結合方式。
  14. The paper includes the contents as follows : the second chapter introduces the basic theory of bp neural network, chapter 3 puts forward a solution named divide - assemble, chapter 4 introduces the preprocessing of input population, chapter 5 introduces the basic theory of genetic algorithms, chapter 6 discusses gdr - ga algorithms, 7 part introduces the processing of atm band - width distribution dynamically and gives several program modules among them. chapter 8 introduces the interface, running and results about the software system, the last chapter summarizes research work of this dissertation and further researches arc prospected

    本文主要包括以下內容:第2部分闡述bp神經網路基本理論,第3部分介紹了拆分組裝方法,第4部分主要介紹了bp神經網路輸入樣本的預處理,第5部分介紹了遺傳演算法的發展及其基本理論,第6章介紹的是最速梯度? ?遺傳演算法,第7部分介紹了atm帶寬動態分配過程、子網與總網的學習過程和其中的一些關鍵程序模塊,第8部分介紹的是該系統界面和運行情況,最後一部分總結了論文所做的工作和進一步工作設想。
  15. The theory and algorithms of automatic fingerprint identification system ( afis ) preprocess are systematically illustrated

    摘要系統闡述了自動指紋識別系統預處理的理論、演算法。
  16. The algorithm for certificates path construction that it is suitable for pki with bridge certification authority and cross authentication is proposed based on the theory of breadth first search algorithms for graphs

    基幹圖的寬度優先搜索理論,提出了適用於具有橋接ca和交叉認證的pki系統中的證書路徑構造演算法。
  17. Based on the single genetic algorithms and the features of the distribution network reconfiguration, this dissertation makes a further study on such aspects as selection operator, crossover operator, mutation operator, termination conditions and etc, thus, puts forward improved genetic algorithms. the dissertation makes certain study on the optimization reconfiguration model of distribution network. it puts forward a multi - objective model and according to the theory of variable weight coefficients transforms the multi - objective problem into a single - objective one

    針對目前遺傳演算法在配電網路重構應用中的不足,論文著重從選擇運算元、交叉運算元、變異運算元和收斂準則等方面進行了改進,把最優保存策略和兩兩競爭相結合的方法作為新的選擇運算元,採用隨最優個體相對保留代數自適應變化的交叉和變異運算元,把最優個體最少保留代數作為演算法的終止條件。
  18. In the second chapter, the theory of vsb is described. following that, the theory and algorithms of the main functional receiving components for our transmission draft are described in detail and analyzed deeply. these algorithms are applied in the chip successfully

    第二章,首先講述vsb的調制原理,然後針對我們提出的數字電視傳輸方案下的有線通道接收晶元的各個主要功能模塊的實現原理和採用的演算法進行了較詳細的敘述和較深入的分析,這些演算法在本晶元中得到了成功的應用。
  19. The main works and achievements are described : firstly, the characteristic of contact problems and the theory of finite element method are introduced, then on the base of finite element method, building models about contact problems are discussed, and the basic theories of some algorithms such as general finite element method, super element method and mix finite element method are presented simply

    工作內容主要包括以下幾個方面:首先介紹接觸問題的特點及有限元法的一般原理。然後討論接觸問題有限元模型的建立,並對接觸問題的一般有限元法、超元技術、混合有限元法的基本原理作簡要闡述。
  20. My graduate school experience convinced me that i was not smart enough to be an expert in the theory of algorithms and also that i liked procedural languages better than functional ones

    我的研究生經歷使我意識到我沒有從事理論數學研究的潛質不可能成為那方面專家,還好,我對程序語言比對數學函數更感興趣。
分享友人