序數類 的英文怎麼說

中文拼音 [shǔlèi]
序數類 英文
ordinal number class
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名1 (許多相似或相同的事物的綜合; 種類) class; category; kind; type 2 (姓氏) a surname Ⅱ動詞...
  1. So we consider five financial indexes includes stock b / p, e / p, current stock size, current stock stru and financial levge by the international tradition, then descriptive statistical test method and cross section statistical test method proved that b / p and current stock size have marked effect on the securities yield besides coefficient b. in the third chapter, the article fut forward a risk factor model, estimates yield sequences of every risk factor by weight regression, and then estimates each risk factor coefficient of different stock by time sequence regression, at last we can reckon the portfolio risk o2p and yield rp which consists n stocks

    結合國際慣例,文章考慮了股票的凈值市價比( b p ) ,市盈率倒( e p ) ,流通規模( size ) ,流通比例( stru )和財務杠桿( levge )等五個財務指標,應用描述性統計檢驗和橫截面統計檢驗等多種方法,結果表明,除系以外,凈值市價比( b p )和流通規模( size )對證券收益率部有重要的影響。在論文的第三章,提出了一個基於多因素的風險因子模型,並用加權回歸和時間列回歸等方法估計出了不同證券的各風險因子系似於單指模型中的系) ,據此,即可衡量出一個包括n只股票的組合的風險_ p ~ 2和收益率r _ p 。
  2. Isomorphism between two - type ordinals and well - ordering two - type classes structues

    二型與良二型的同構
  3. The detailed works are as follows : the finding patterns problems in the time - series data sequence are described, and a new trend logic expression method is introduced, and its algorithm and experiment result of algorithm are given ; time - scries data are disposed, and using the arctg. slope of line as the sample of pattern recognition, so ignoring the aberrance of pattern in the classified. in addition, a new time - series pattern finding algorithm based on higher - order neural network is put forward

    同時給出了本文的具體的工作,主要是:對在時列中發現模式問題進行了描述,並介紹了一種新的趨勢邏輯表示方法,給出了其演算法及演算法的實驗結果;對時據進行處理,提出了利用線段的斜率反正切值作為模式識別的樣本,從而在分時忽略模式的畸變;另外,還提出了一個新的基於高階神經網路的時模式發現演算法。
  4. Based on a systematic discussion on the contents, characteristics and the up - to - now accomplishments of these three operations in cagd, we present our researches in three ways as follows : ( 1 ) efficient evaluation for parametric curves and surfaces based on generalized ball bases based on the generalization of mathematical model of surface lofting program in the consurf system, two generalized ball surfaces and the recursive algorithms for evaluating them are given. furthermore, the conversion algorithms from bezier form of a surface to these two generalized ball forms are presented

    在系統地論述cagd中此三運算的內容、特點、已有研究成果的基礎上,就以下三方面給出了研究成果: ( 1 )基於廣義ball基的參曲線曲面快速求值以前英國航空公司consurf系統機身模線程學模型的推廣為基礎,定義了兩廣義ball基曲面,給出了求值的遞推演算法,推導了b zier曲面到這兩曲面的轉換演算法
  5. The. net compact framework data provider for sql server mobile is a collection of classes that is used in the managed development environment to provide smart devices access to sql server mobile databases

    用於sql server mobile的. net compact framework據提供程的集合,該集合在託管開發環境中用於提供對sql server mobile據庫的智能設備訪問。使用
  6. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用列建立模糊子集b ,然後用模糊識別方法中的最小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵據庫,根據被監控程別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  7. These activities include : counting, sorting, classifying objects, experiences with series of sizes and colors, weighing and measuring, carrying out housework such as dish washing, with many sequential, logical steps ? these are activities that nourish the mathematical mind

    這些行為包括:、排、分、大小和顏色列、重量和測量,做家務時比如洗碗,按照順和邏輯的步驟?這些活動可以培養學頭腦。
  8. The latter is the emphasis of this article. its hard core is the accidence analysis builder grammar _ lexer. mll and the syntax analysis builder grammarjpaser. mly. it transforms the fortran character string in the program, which would be processed automatic differentiation transform, into data stream of diversified syntax units

    詞法分析和語法分析部分又分為輸入命令據流以及fortran源程據流的詞法分析和語法分析,后一部分是本文分析的重點,它以詞法分析程生成器grammarlexer . mll和語法分析程生成器grammarpaser . mly為核心,將進行自動微分變換的fortran源代碼字元串變換成各語法單位的據流。
  9. For instance numeric compounds, such as natural numbers, real number, date, phone numbers etc., are of this type. the second type is one that cannot be exactly represented by regular expressions, for they are open set and have no closed form representation. for instance, noun compounds and verb compounds are of this type

    第一種是封閉型,這型的未知詞雖然量上可能有無窮多個,但是可以用規則語法( regularexpression )形式的構詞律產生,例如和字有關的復合詞,不管是自然,小,號碼,時間等都屬于這種型。
  10. It has detailed descriptions of the general strategies in developing gis controls, such as the selection of data store mode, efficient organization of spatial data and property data and the optimization rules of controls etc. chapter 6 refers to the special development and realization of components gis of power network. it comprises the key questions in the course of developing gis controls. the questions are : how to divide the classes in programs, the layer relationship of classes, the definition of classes, the partial realizations of graphical operations, the interfaces between control and exterior program, and the interfaces between control and database etc. chapter 7 concisely explains a practical components gis control application - huaxian power network gis system

    這些問題包括:程的劃分;的層次關系;的定義;部分圖形操作的具體實現;控制項與外界程的介面;控制項和據庫的介面等:第七章為應用實例一滑縣電網s系統,本章簡要介紹了用組件式gis控制項開發的以s系統的設計目標、設計原則、系統集成框架和系統功能等; ;第八章對系統的可用性做分析,並討論了一些需要進一步完善的問題。
  11. This paper firstly applied sequential cluster method to set up the classification standard of precipitation state based on the fact that there are much uncertainty and imprecise characteristics in the precipitation course ; then this paper presented a method which is called markov chain with weights to predicted the future precipitation state by regarding the standardized self - coefficients as weights based on the special characteristics of precipitation being a dependent stochastic variable ; and applied this method to a real hydrological observation station with nearly 50 years precipitation information in shanxi province at last, an ideal result was obtained

    摘要首先基於降水過程存在大量不確定性、不精確性的特點,應用有的方法建立降水豐枯狀況的分級標準;然後針對降水量為相依隨機變量的特點,採取以規范化的各階自相關系為權重,用加權的馬爾可夫鏈模型來預測未來降水的豐枯變化狀況;最後以山西省某水文站近50年的降水資料為實例對該方法進行了具體的應用,獲得了較為滿意的結果。
  12. Gets the type name of the data - binding handler

    獲取據綁定處理程型名稱。
  13. Examples include drawing or graphics applications, data - entry systems, point - of - sale systems, and games

    繪圖或圖形應用程據輸入系統、銷售點系統和游戲都屬于這應用程
  14. If overflow occurs converting one integer type to another, the high order bits are truncated

    如果在將一個整型轉換為另一個整型時發生溢出,則截斷高位位元組。
  15. The autocorrelation function of the pn code is similar to that of the white noise, which has the randomicity. the pn code phase modulation fuze just works on the basis of this characteristic. the fuse, having excellent cut - off performance of the distance and strong anti - jamming capability, is one of the radio fuze of the predominant performance

    偽碼引信是利用偽隨機列的自相關函似於白噪聲相關函的隨機特性而工作的,這種引信距離截止特性好,抗干擾能力強,是一種性能優越的無線電引信。
  16. The wsdl binding definition describes the endpoint behavior for a web service, including the operations, parameters, additional operation and parameter types, and protocols that other applications must use to call the web service

    Wsdl綁定定義描述web服務的終結點行為,其中包括操作、參、額外操作和參型以及其他應用程在調用web服務時必須使用的協議。
  17. Class is used to pass sort data from the server to the client

    用於將排據從服務器傳遞到客戶端。
  18. These sites are not individually reviewed because they are all just listings of categories and accompanying numerical classifications

    這些網頁並不只是單純的瀏覽,他們是經由字排的一覽表。
  19. Method for a return status parameter, you must specify not only the data type to be used for the parameter, but also the parameter s ordinal placement in the stored procedure call

    方法傳遞返回狀態參值時,不僅需要指定要使用的參型,還必須指定參在存儲過程中的位置。
  20. It comes up with a new notion, d - solution, which is applied to the distance estimation, by virtue of hilbert space ; furthermore, the dissertation has gained a necessary condition which is identity of minimum mean - square value in linear function classes, so that d - solution extends minimum mean - square value within the domain of nonlinear function equation or equation system ; and, the dissertation studies in detail the classical moment estimation and maximal likelihood estimation on the parameters of ar ( p ), a series of theorems in the estimation section shows the moment estimators are consistent on the ground of large samples jikewise, those distribution functions of the estimated parameters accord to maximum likelihood estimation converge gauss distribution if the white noise is gaussan

    首先,藉助hilbert空間理論,提出了距離估計的d -解,給出了d -解的必要條件,這個條件在線性函里即是極小二乘估計法, d -解的必要條件滿足的方程實質上將極小二乘估計法推廣到多函及非線性函。再而,詳細地研究了多元弱平穩列自回歸模型ar ( p )的參經典的矩的替代估計和極大似然估計,獲得矩的替代估計的一致性的結果。對基於gauss白噪聲假設多元弱平穩列自回歸模型的均值、白噪聲的協方差陣的極大似然估計都有依分佈收斂到多元正態分佈的統計性質。
分享友人