您要查找的是不是:
- Li Yiquan,He Benteng.Identification of foundamental wave in CVT trensient process based on expaneded prony algorithm[J].Proceedings of the CSEE,2005,25(14):30-34(in Chinese). [3]李一泉;何奔腾.;基于PRONY算法的电容式电压互感器暂态基波辨识[J]
- WU Xu-sheng,MA Wei-ming,WANG Gong-bao,etal.Parameter identification of synchronous machine based on wavelet transform and Prony algorithm[J].Automation of Electric Power Systems,2003,27(19):38-42. [1]吴旭升;马伟明;王公宝;等.;基于小波变换和Prony算法的同步电机参数辨识[J]
- Prony algorithm Prony算法
- expansion Prony algorithm 扩充Prony算法
- The Prony complex exponential model is converted into the ARMA model, and the Prony identification algorithm(PIA) is developed in this paper. 本文把Prony复指数模型转换为ARMA模型,并建立了Prony识别算法(PIA)。
- Goertzel algorithm is a fast algorithm of DFT. 戈泽尔算法是离散傅立叶变换的一种快速算法。
- Rms algorithm and FFT algorithm have been achieved. 实现了均方根算法和FFT算法。
- Use a second algorithm to validate your results. 使用第二套算法来验证你的结果。
- The name of the key exchange algorithm. 密钥交换算法的名称。
- Local algorithm for segmented image interpolation. 分割图像插值的一种局部算法。
- Bad Authentication Algorithm Value Entry %1! S! 坏身份验证算法值项%251!
- Gets the key exchange algorithm used by this. 使用的密钥交换算法。
- Description of the algorithm used with the key. 对密钥所用算法的说明。
- The padding mode used in the hashing algorithm. 哈希算法中使用的填充模式。
- The compare algorithm is used to do the comparison. 比较算法是用来比较属性值的。
- A very good image compression algorithm! 详细说明:一个很好的图像压缩算法!
- Study On Routing Algorithm In Gigabit. 千兆以太网路由算法研究。
- Constant to establish the limits of that algorithm. 常数来建立该算法的限制。
- Study of Optimization Algorithm Bas. 基于动态神经网络优化算法研究;
- How good is the simplex algorithm? 单纯形算法有多好?
