algorithm insolubility
可解性
algorithm insolubility
可解性
a basic algorithm for division.
除法基本法则。
The trackability limitation of current gradient algorithm is discussed.A new algorithm, named variable parameter gradient estimation algorithm with local polynomial approximation is proposed.
本文分析了梯度辨识法跟踪时变系统的缺点,提出了一种新的基于局部逼近的变参数梯度估计法。
In this paper, ACO algorithm is reviewed by and large.Firstly, the corresponding principle of biont and the implementing framework for ACO algorithm are introduced simply.
摘要本文首先简要地介绍蚁群优化法的来源、对应的生物原理和法实现的框架。
An example is given to demonstrate the proposed algorithm by comparing it with the other genetic algorithms presented in preterit articles.
最后给出相应实例,并与其它文献中的方法比较验证了本文法的可行性和有效性。
The best uniform approximation algorithm to approach the catenary suspension and the CAD system using this algorithm to design the catenarian dome of hot blast stove are described in the paper.
介绍了采用最佳一致逼近法对悬链线进行逼近,以及运用此法进行热风炉悬链线拱顶设计的CAD)系统。
As compared with the hybrid tracking and the coplane four-point registration algorithms, the proposed algorithm is of higher registration accuracy.
与混合跟踪注册法、共面四点注册法相比,文中方法具有更高的精度。
Bitonic is introduced and a theorem is proved. The algorithm of bitonic merge-sort is given.
介绍了二分序列的概念和定理证明,给出了利用二分归并进行排序的法及实例.
secondly, the algorithm of QPSK and Root Raised Cosin are discussed ;
对QPSK调制法及均方根升余弦低通滤波法进行了详细论证;
Preconditioned con- jugate gradient algorithm is a fast and accurate computational algorithm.
预条件共轭梯度法是一种精确并且收敛迅速的计方法。
Given are 2 upvalue algorithms and a curve automatic matching method.
给出了上提值的2种计方法和曲线的匹配方法。
The security of encryption algorithms depends heavily on the computational infeasibility of brute force attack.
加密法的安全性很大程度上取决于暴力破解的不可行性。
Finally,the testification of algorithm validation was undertaken by measured data of a real freeway.
最后,用实测数据对模型进行校验。
The MD5 algorithm,a one-way hash algorithm,is improved availably by adding a hidden ‘antibody’ factor to the algorithm for withstanding cribber’s exhaustion search.
单向散列法选用MD5法,并通过向法中注入隐蔽的“抗体”因子以抵抗篡改者的穷举搜索,使MD5法得到有效的改进。
System appoints master or slave computer utilizing identity-affirmant algorithm at start-up.Voting algorithm judges validity of data and detects fault.Synchronous algorithm synchronizes status,...
竞争型主从机身份确认法用于系统启动时的主从机认定,表决法用于判断数据的有效性并分析系统是否存在故障,同步任务用于在分机间实现状态、任务、时钟同步。
The algorithm in the proposed program can mask the image data and permute pixels location by chaotic sequences.
法程序首次采用了图像数据的混沌掩盖加密和图像象素位置的置乱加密相结合的方法,对图像进行了两次复合的混沌加密。
At the same time, through constructing the new generation within phyle, the searching rate in optimization of the algorithm is increased.
同时,提出了在宗族中构造子代种群的思想,提高了法的寻优效率。
An algorithm was constructed to solve the least squares bisymmetric solution of a class of matrix equation.
摘要构造了一种迭代法求一类矩阵方程的最小二乘双对称解。
ORRLS法可以保证所得特征矢量矩阵具有正交性,还可以自适应地估计子空间维数。
ORRLS algorithm can guarantee orthonormality of the weight matrix in iteration.Moreover, it can track the rank of interference subspace.
Bicubic rescale algorithm shrinks video to small screen size in best possible quality.
使用双三插值运来修改画面大小,使得画质得到尽可能的保证。
声明:以上例句、词性分类均由互联网资源自动生成,部分未经过人工审核,其表达内容亦不代表本软件的观点;若发现问题,欢迎向我们指正。