exchange algorithm

英 [ɪksˈtʃeɪndʒ ˈælɡərɪðəm] 美 [ɪksˈtʃeɪndʒ ˈælɡərɪðəm]

交换算法

计算机



双语例句

  1. Research on the Data Exchange Algorithm of the Wireless Sensor Network
    基于无线传感器网络的数据交换算法的研究
  2. A branch exchange algorithm which is based on the pivoting operation of the linear programming algorithm is used to solve this problem, A practical e.
    文中利用基于线性规划换基运算的支路交换法求解该模型,得到了快速、实用的结果。
  3. A refined branch-exchange algorithm for distribution networks reconfiguration
    配电网络重构的改进支路交换法
  4. Four types of linear phase FIR filters are introduced at first, then of this basis a notch filter for processing ECG signal is designed by using multiple exchange algorithm.
    首先介绍了线性相位FIR滤波器的四种情况,然后在此基础上设计了一种应用多重交换算法来处理心电信号的陷波滤波器。
  5. This paper gives the characterization of two-variable linear optimal approximation of strict convex functions in C~ 2 ( D), find the exchange algorithm of the polynomial of two-variable linear optimal approximation, and prove the convergence of this algorithm.
    本文给出C~2(D)中严格凸函数二元一次最佳逼近的特征、求二元一次最佳逼近多项式的交换算法并证明该算法的收敛性。
  6. Convergence of Exchange Algorithm of Tchebycheff Approximation in Several Variables
    多元Tchebycheff逼近交换算法的收敛性
  7. Authenticated Key Exchange Algorithm
    身份认证的密钥交换算法
  8. A constraint satisfaction model is given. A hybrid solving algorithm is designed based on constraint satisfaction and heuristics node exchange algorithm.
    给出板坯排序问题的约束满足模型,设计了基于约束满足和启发式混合求解算法。
  9. The multi-routes k-opt exchange algorithm is firstly proposed, which is the extension in multi-routes of the traditional k-opt exchange algorithm, where the points exchanged are not only the ones in a single route but also in several routes.
    本文首先提出了多路径k-opt交换方法,该方法是传统k-opt交换方法用于多路径间的扩展,其进行交换的点不再局限于单一路径内部,而是多个路径的点都可以参入交换。
  10. Distribution system optimum planning by branch exchange algorithm
    支路交换法在配电网优化规划中的应用
  11. The branch exchange algorithm is one of the methods concerning distribution network reconfiguration to reach loss reduction.
    本文首先详细地描述了一种网损最小的配电网络重构算法&支路交换法。
  12. A new method for securing transmission by use of DH ( Diffie-Hellman) key exchange algorithm and DES ( Data Encryption Standard) algorithm to transfer the DH parameters directly is presented.
    该方法以明文方式传送DH密钥交换的参数,客户端和服务器端利用这些参数计算共知的密钥,并用该密钥对希望加密的数据进行DES加密。
  13. Parallel exchange algorithm for best uniform approximation problem
    最佳一致逼近问题的并行交换算法
  14. In the end, the author analyzed the performances of search and exchange algorithm in P-Grid, which proved that it has great predominance and prospects to apply P-Grid technology into info-sharing applications.
    在文章最后,作者对P一Grid技术的搜索算法和构建算法进行了性能分析,从而验证了P一Grid技术在信息共享应用中有着极大的优势和前景。
  15. Multi-routes k-opt Exchange Algorithm for a Class of Vehicle Transportation Problem
    一类车辆运输问题的多路径k-opt交换算法
  16. Linear Phase Log FIR Filter Design Based on Remez Exchange Algorithm
    基于雷米兹交换算法设计线性相位对数FIR滤波器
  17. After analyzing the structure and format of low level data files, a method of data exchange between Mentor and Cadence is proposed. The software realization of the data exchange algorithm for schematic and netlist is also given in this paper.
    该文以工作站上电子CAD工具Mentor和Cadence为例,分析了底层数据文件结构与格式,给出了原理图、网表和两个层次数据交换算法的软件实现。
  18. Three algorithms: Information Query Algorithm, DIRA ( Dynamic Information Route Algorithm), IRH Route Exchange Algorithm of the Boundary Area were proposed.
    提出并实现了信息检索算法,动态信息路由交换算法DIRA和边界域IRH的路由交换算法;
  19. An Exchange Algorithm for the Best Chebyshev Normal Approximation by Quadratic Curves
    二次曲线Chebyshev法向逼近的交换算法
  20. Design of an equiripple FIR kth-notch filter using multiple exchange algorithm
    应用多重交换法设计具有k个陷波频点的等波纹FIR陷波滤波器
  21. Describes the key exchange algorithm based on the discrete logarithm problem of elliptic curve over Galois Field Gives the conditions to construct a secure elliptic curve crypto-system after analyzing the crisis of this crypto-system.
    分析了椭圆曲线密码的安全性,给出了构造安全椭圆曲线的条件。
  22. Research and Application of the Parallel Data Exchange Algorithm in the Controller of the New Model Computerized Flat Knitting Machine
    新型电脑横机控制器中数据交换并行接口的设计与应用
  23. Secondly, the principle of ECC, including the math foundation and basic conception are expounded. Data encryption algorithm, key exchange algorithm and digital signature algorithm based on the elliptic curve encrypt scheme are analyzed.
    其次详细论述了椭圆曲线密码体制的原理,包括相关的数学基础知识、基本概念,以及基于椭圆曲线密码体制的密钥交换、数据加密、数字签名算法。
  24. Considering the demand of high efficiency to restoration reconfiguration, some parameters of distribution network are simplified, and then the voltage drop for service restoration reconfiguration in distribution network is proposed on the base of branch exchange algorithm.
    考虑到恢复重构对实时性的要求,在支路算法的基础上,通过合理的是参数简化,提出了基于电压降的配电网故障恢复重构。
  25. One is based on the principle of network computation and is called nodes information exchange algorithm, which can be used to find out directly the minimum paths set of a network and be characterised by parallel computing.
    一种是基于网络计算思想的直接求解GRBDS网络系统不交化最小路集的节点信息交互算法,节点信息交互算法具有并行计算的特点。
  26. There are two core algorithms in this retrieval mechanism, one is the super node neighbor selection algorithm and the other is index information exchange algorithm.
    检索机制中比较核心的算法有超级节点邻居选取算法和索引信息交流算法。
  27. If the weight limit for each column does not satisfy this constraint, an iterative exchange algorithm can guarantee the columns are not overweight in the case the level of center of gravity increase little.
    如果每列限重这个约束不满足,设计了一种迭代交换算法,可以保证引起水平重心增加最小的情况下,各列均不超重。
  28. The use of graphical topology transformation, improved key exchange algorithm and homotopy projection mapping completed the initial key into a dynamic password. 4.
    运用图形的拓扑变换、改进的密钥交换算法以及同伦投影映射完成初始密钥转换成动态口令。
  29. For creating large shared memory between real-time process and non real-time process may affect the performance and stability of the simulation system, this thesis presents a high-performance data exchange algorithm based on optimized data buffer queue.
    论文针对实时进程与非实时进程间建立大的共享内存区影响系统性能和稳定性的问题,提出了基于缓冲队列的高效数据转存算法。
  30. The Kerberos protocol is analyzed, and there is guessing attack defects. DH key exchange algorithm and public-key cryptosystem are introduced to Kerberos authentication protocol.
    对Kerberos协议分析指出,协议存在猜测攻击的缺陷,提出将DH密钥交换算法和公钥密码体制引入到Kerberos认证协议中。