英语人>网络例句>扩充 相关的搜索结果
网络例句

扩充

与 扩充 相关的网络例句 [注:此内容来源于网络,仅供参考]

Through function expansion and technique improvement of gun control system of combat vehicle, floating benchmark coordinate axis is used for system design based on the analysis of characteristic of each function error.

通过战车炮控系统功能扩充与技术改造,在分析各个功能误差特性的基础上,采用浮动基准坐标轴的系统设计,只用增加一个"数字控制器",就可实现多项功能的综合,从而简化了系统的结构,降低了系统的成本。

In VSE, to bring a program phase from a core image library into main storage for execution.

在虚机扩充磁盘操作系统中,把核心映象库中的程序段装入主存以便执行。

To solve the difficult depiction about the underwater counterwork system's static structure and dynamic process by traditional model at one time, and to meet the requirements of modeling for layering and extension, the model based on Object Petri Net was proposed.

针对通常的模型不能同时描述水下对抗系统的静态结构和动态过程,而且在层次化、可扩充性等方面也不能满足建模需求的问题,采用对象Petri网建立了水下对抗系统的模型。

Chaper 3 is general description of ADA encryption. Chapter 4 deals with the transform domain encryption. Includes the element of perfect and quasi-perfect transform domain encryption, and presents two type new schemes. Chapter 5 deals with asynchronous ADA encryption. Extends the general theory and model of asynchronous ADA scrambling, and introduces two type phase-distortion-free a synchronous ADA schemes. Chapter 6 is about new direction of ADA encryption. Includes TASI scrambling, transform domain dummy insertion scrambling, noise coving scrambling and other multi-dimension ADA scrambling, and proposes an adaptive dummy spectrum insertion asynchronous scrambling and a new adaptive noise-coving DFT scrambling algorithm. Chapter 7 is on permutation key. presents part results on permutation features, selecting criterion and constructing method. Chapter 8 introduces the hard and software design of a common ADA encryption/decryption system, and presents the experimental results on several proposed ADA encryption schemes.

第一章为绪论;第二章为语声信号、及其处理基础;第三章为模数模加密的一般描述;第四章为变换域加密研究,包括变换域加密机理,变换域完善与准完善保密研究,提出两种新的变换域加密方案;第五章为异步模数模加密研究,扩充了异步模数模加密的一般理论,介绍了两种新的无相位失真异步加密方案的原理与实现方法;第六章对模数模加密新方向:TASI应用途径、变换域伪谱插空置乱、噪声掩盖、多维置乱加密的原理和方法进行介绍,提出了自适应伪频插空异步模数模置乱算法与自适应DFT系数噪声掩盖置乱新算法;第七章为置换密钥性质、筛选准则以及构造方法研究的部分结果;第八章介绍了通用模数模加/解密实验系统的硬件、软件研制概况,并给出了几种加密方法的实验结果。

Traditional call center database is designed with two-tier structure.

传统的呼叫中心数据库设计采用的是二层结构,随着企业应用系统的不断扩充和新应用的不断增加,二层数据处理结构暴露出许多问题。

We present a dense timed interval temporal logic and exploit the decidability problem of DTITL.

定义了稠密时间区间时序逻辑,它是区间时序逻辑的一种实时扩充

Experiment results show that the extended decision procedure supports most verification formulas met in slicing execution.

我们优化了判定过程,并扩充了对整数除法、取余和位运算的支持。

Based on this extended directed graph, an algorithm for creating it is proposed, the time complexity analysis of the algorithm is given, and its correctness is proved.

基于这种扩充有向图,提出了一种对象范式生成算法,并给出了算法的时间复杂度分析和正确性证明。

In order to develop a new method for creating such an object normal form, the meaning of a vertex of the directed graph is extended, such that it is not only a simple vertex, but also a directed graph.

为了研究新的对象范式生成方法,对有向图顶点的含义进行了扩充,使其不仅可以是一个简单的顶点,还可以是一个有向图。

The parameter distribution and scheme evaluation of reliability theory has been successful researched.

成功研究了用单项工程多维数据库和数据仓库模型研究可靠性理论的参数分布及方案评价;提出了c,φ是相互关联的假设进一步扩充了路基可靠性理论的应用范畴。

第11/67页 首页 < ... 7 8 9 10 11 12 13 14 15 ... > 尾页
推荐网络例句

Since historical times,England ,where the early inhabitants were Celts, has been conquered three times .

从有历史以来,英国,在此地早期居住的是凯尔特人,已经被征服了三次。

Bluetooth OBEX File Transfer Enables the sending and receiving of files on your phone via Bluetooth.

蓝牙OBEX文件移动允许经过蓝牙传送和接受文件。。。。

The almost sure central limit theorem is a pop topic of the probability research in recent years,because it has many actual applications in the random analogue.

中文摘要:几乎处处中心极限定理是近几十年概率论研究的一个热门话题。它之所以引起人们的注意是由于它在随机模拟方面的实际应用参见Fisher