散化規則 的英文怎麼說

中文拼音 [sǎnhuàguī]
散化規則 英文
bulk chemical code
  • : 散動詞1. (由聚集而分離) break up; disperse 2. (散布) distribute; disseminate; give out 3. (排除) dispel; let out
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
  1. Yellow - green or yellow chlorosis or brown necrosis in basal areas of older and expanding leaves ; margins curled downwards and leaf expansion irregular and suppressed ; chlorosis and necrosis spreading into interveinal areas of older leaves ; youngest leaves distorted, necrotic and failing to expand ; petioles truncated ; death of stem growing point

    西葫蘆缺硼:老葉和正展開葉的基部黃綠色或黃或變褐壞死,邊緣向下捲曲和葉片展開不和抑制,色斑和壞死斑布在老葉葉脈間,心葉扭歪、壞死、無法展開,莖生長點枯死
  2. This paper reviews adopted fiscal, political and administrative measures of decentralization in empirical studies and proposes using delphi technique to measure decentralization in local planning decision - making

    本研究總結了從財政、政治和管理方面對分進行評價的經驗研究和研究過程,介紹了如何應用德爾菲法來評價土地利用劃的地方決策過程。
  3. A large quantity of simulation data indicates that, the toggle rules found by this genetical algorithm have good avalanche effects and diffusibility

    通過大量的實驗統計數據表明這類演具有良好的雪崩性、擴性。
  4. On theory, based on the latest research of the international neuro - physiologist and psychologist on no, we detail several important results highlighting the role of source structure in the diffusion process, such as point source, hollow sphere source and irregular structure. second, we have had a advanced research on self - organizing feature maps. and some qualities of sofm have been analyzed

    理論地,在國際神經生理學、心理學與醫學關于內源性一氧氮( no )最新研究的基礎上,深入分析一氧氮的非局部擴遞質和逆轉錄信使的特性,同時針對模型的不同結構(包括對稱形狀和不形狀)給出模擬結果。
  5. The international safety management ( ism ) code was adopted by the international maritime organisation ( imo ) in november 1993 and became applicable starting july 1, 1998, to passenger ships including passenger high - speed craft ( hsc ), oil and chemical tankers, gas carriers, bulk carriers, high - speed cargo vessels of 500 gross registered tonnes ( grt ) and over

    《國際安全管理》於一九九三年十一月獲國際海事組織通過,由一九九八年七月一日起適用於客船,包括載客高速船在內,以及所有總噸位達到或超過500噸的油輪、學品液貨船、氣體運輸船、裝貨輪和載貨高速船。
  6. It is impossible to be certain. there is no sign of imminent hostilities. it appears that prc military activity is somewhat elevated, but reports in the media have been exaggerated

    過去十年它已加入禁止核武擴條約、學武器公約、生物武器公約、全面禁止核試條約,上述每一條約都有明確的、申報要求與檢查制度。
  7. Attributes reduct, mining classification rules, and discretizing values of quantitative attributes are three fields in mining classification rules

    屬性約簡、分類提取、數量屬性離是分類挖掘的三個方面。
  8. Bringing forward an intelligent decision method of image segmentation based on roughset theory to make the system automatically select segmentation algorithm in simple scenes. firstly, it selects some representative segmentation algorithms to make up of an algorithm library, which is used to process kinds of sample images ; secondly, it makes the decision informationtable utilizing diversified numerical features extracted from the sample images and the optimalsegmentation algorithm of each sample image according to segmentation quality evaluationcriterion ; finally, it applies rough set theory on discretization and attribution reduction of

    為了使系統在簡單場景下能夠通過自動選取分割演算法來提取目標,提出了一種基於粗糙集理論的圖像分割智能決策方法。首先選取若干具代表性的分割演算法構成演算法庫,並用它們對各種樣本圖像進行分割;然後利用從樣本圖像中提取出來的各種數值特徵,並根據圖像分割質量評價標準評判出各樣本圖像的最優分割演算法,用其構成決策信息表;最後應用粗糙集理論來對決策信息表進行離處理和屬性約簡,以生成圖像分割演算法選取的決策
  9. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分式模型以及基於庫的審計策略,並針對傳統審計庫的缺陷,通過對審計進行形式描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。
  10. Firstly, influence factors of generalization of neural network are presented in this thesis, in order to improve neural network ’ s generalization ability and dynamic knowledge acquirement adaptive ability, a structure auto - adaptive neural network new model based on genetic algorithm is proposed to optimize structure parameter of nn including hidden layer nodes, training epochs, initial weights, and so on ; secondly, through establishing integrating neural network and introducing data fusion technique, the integrality and precision of acquired knowledge is greatly improved. then aiming at the incompleteness and uncertainty problem consisting in the process of knowledge acquirement, knowledge acquirement method based on rough sets is explored to fulfill the rule extraction for intelligent diagnosis expert system, by completing missing value data and eliminating unnecessary attributes, discretization of continuous attribute, reducing redundancy, extracting rules in this thesis. finally, rough sets theory and neural network are combined to form rnn ( rough neural network ) model for acquiring knowledge, in which rough sets theory is employed to carry out some preprocessing and neural network is acted as one role of dynamic knowledge acquirement, and rnn can improve the speed and quality of knowledge acquirement greatly

    本文首先討論了影響神經網路的泛能力的因素,提出了一種新的結構自適應神經網路學習演算法,在新方法中,採用了遺傳演算法對神經網路的結構參數(隱層節點數、訓練精度、初始權值)進行優,大大提高了神經網路的泛能力和知識動態獲取自適應能力;其次,構造集成神經網路,引入數據融合演算法,實現了基於集成神經網路的融合診斷,有效地提高了知識獲取的全面性、完善性及精度;然後,針對知識獲取過程中所存在的不確定性、不完備性等問題,探討了運用粗糙集理論的知識獲取方法,通過缺損數據補齊、連續數據的離、沖突消除、冗餘信息約簡、知識抽取等一系列的演算法實現了智能診斷的知識獲取;最後,將粗糙集理論與神經網路相結合,研究了粗糙集-神經網路的知識獲取方法。
  11. On the following, on the basis of formulas given above, three kinds of effects due to ionosphere are presented : image shift due to group delay which was caused by the difference between the group velocity and the velocity of light in the ionosphere ; image distortion due to ionospheric dispersion which can create second phase error of lfm signals ; the last, the phase perturbation caused by the irregularities of the ionosphere can reduce the coherent length and affect azimuthal resolution

    文中主要研究了電離層的三種影響:信號經過電離層傳播的群延遲引起的成像偏移;電離層的色效應給線性調頻信號帶來二次相位誤差,導致圖像退、失真;以及電離層的閃爍、湍流等不性引起的信號相位起伏。在此基礎上,比較分析了不同波段、帶寬條件下電離層的影響。
  12. This paper studied the dispersion and the field distribution of the wave - guide with helical corrugation operating in 8mm wave band. the main works of this dissertation are listed as following : 1. based on the theory of coupled - wave, using the method of perturbation, the coupled - wave equations are derived and the rule of coupling is gotten. 2

    2 .利用螺旋波紋波導的耦合波方程和模式耦合,得到波導色方程,利用visualfortran平臺編程進行數值模擬,分析相關物理參數對色特性的影響;對波導的行波幅值耦合方程進行數值模擬,從而簡了耦合方程,在此基礎上利用visualfortran平臺編程進行數值模擬,分析螺旋波紋波導的場分佈情況。
  13. The result indicates that when the air content of the concrete changes from 1 to 4 percent, the polarized resistance of the identical flow electricity time increases along with the increment of the air content, the corrosion current density reduces along with the increment of air content, the chloride ion diffusion coefficient reduces with the increment of air content ; when air content changes from 4 to 6 percent, the rule of the change of the polarized resistance and corrosion current density happens to be the opposite, the diffusion coefficient of the chloride ion increases along with the increment of air content ; when the air content is 4 percent, the rust - resisting property of concrete is best, and so is the impermeability of the concrete

    試驗結果表明,混凝土的含氣量在1 . 9 % ~ 4 . 2 %變時,極電阻隨含氣量的增大而增大,腐蝕電流密度隨含氣量的增大而減小, cl -擴系數隨含氣量的增大而減小;當含氣量在4 . 2 % ~ 6 . 4 %變時,極電阻、腐蝕電流密度和cl -擴系數的變相反;當含氣量為4 . 2 %時,抗鋼筋銹蝕性能最佳,抗滲性最好。 cl -擴系數與鋼筋銹蝕參數在一定程度上有著良好的相關性,抗滲性的結果較好地反映了混凝土中鋼筋銹蝕的程度,可以用cl -擴系數評價引氣混凝土的抗鋼筋銹蝕性能。
  14. The forming - nucleus drive power could form numerous little crystal nucleus under natural melting temperature. the formation of tic particles in the melt could be divided into two phases which was forming - nucleus and growth. the forming mechanism of tic was : melting ti first surrounded c, then ti melting in the alloy and c formed a complicated reaction mesosphere on the carbon surface

    根據熱力學及動力學分析,認為在碳顆粒界面處tic的形核率很高,形核驅動力足以在正常的熔煉溫度下形成眾多的小晶核;熔體中tic顆粒的合成可分為形核與長大兩個階段,其形核機制為:首先活性ti原子包圍c ,溶入合金中的ti與c在碳表面形成一復雜反應中間層,隨著反應進行, ti和c顆粒不斷減少,生成的tic不斷彌分佈於熔體中;其長大過程伴隨著tic顆粒的相互堆砌、聚集和形態
  15. Considering the defects of typical algorithm for mining frequent itemsets, this dissertation puts forward hy algorithm which is designed to mine association rules and based on the hash technique and the optimized transaction reduction technique

    針對經典頻繁項集挖掘演算法的不足,提出了進行關聯數據挖掘的基於列技術和優的事務壓縮技術的hy演算法。
  16. Besides the advanced manufacturing technology and theory, a series of correlative technologies are required to the implement of networked manufacturing, especially the technologies of distributed computing, information integration and artificial intelligent etc. aiming at their limitations, the paper reconstructed the key supporting technologies employing the last network technologies and protocols, and established a new architecture of networked manufacturing. finally, the demonstrational researches are conducted with " flexible design and manufacturing system of key parts in large - scale antenna " as prototype. the distributed computing platform available of networked manufacturing is constructed with the distributed object technologies such as corba, dcom, rm1 etc, but those rpc modules bring obstacles to the development of global manufacturing due to their limitations

    網路製造系統是個分佈、異構、鬆耦合的智能系統,除了先進製造技術與理念本身,網路製造的具體實現與實施還需要一系列相關技術的支撐,特別是分式計算、製造信息集成、人工智慧等,論文正是針對當前網路製造中上述關鍵支撐技術的不足與局限,運用下一代internet核心范webservices及其相關技術如xml 、 soap 、 wsdl 、 uddi等,提出了面向全球的網路製造全新分式計算解決方案( global - orienteddistributedcomputing , godc ) ;構造了基於xml - schema的製造產品數據描述語言( pdmlbased - xml - schema ) ,給出了express xml及steppart21 xml的映射,並對基於xml step pdm網路製造信息集成方案進行了研究;同時運用webservices 、 xml等先進技術與范對網路製造的multi - agent模型、表示、通訊、調度等進行了研究與重構;最後,以「大型天線關鍵零件網路製造」為原型進行了應用研究。
  17. Firstly, this paper improves single dimensional association rule mining algorithm aprioritidlist based on deep research on association rule mining algorithms, and advances an efficient multidimensional association rule mining algorithm aprioritidlist + that is suitable for vulnerability database of rdbms. furthermore, the algorithm is applied on vulnerability database including data preparation, implement of the algorithm and analysis of experiment results, where data preparation is mainly to select some from numerous vulnerabilities and vulnerability attributes that are suitable for association rule mining to do experiments, meanwhile do the discrete process on quantified attribute values

    本文首先在深入研究關聯挖掘演算法的基礎上,對其中的單維關聯挖掘演算法aprioritidlist進行改進,提出了一種適合關系型弱點數據庫的高效的多維關聯挖掘演算法aprioritidlist + ;並且將該演算法應用到弱點數據庫中,包括數據準備、演算法實現和實驗結果的分析,其中數據準備主要是對數量龐大的弱點信息和弱點屬性進行挑選,取出一部分適合於關聯挖掘的弱點信息來進行實驗,同時也對量屬性值進行了離處理。
  18. Based on optimal hydrothermal modification conditions, the regular hexagonal plates of mg ( oh ) 2 with uniform size and smaller bet surface area were formed after the hydrothermal treatment

    在合理的水熱改性條件下,能夠制備出大晶型、低比表面積、高分六方片狀氫氧鎂阻燃劑。
  19. At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller

    拉帕丟拉模型進行實體,通過研究發現該模型採用強制性安全策略,不易做到靈活的安全控制,因此添加自主存取控制機制的安全策略對原模型進行「鬆弛」 ,並相應的增加了,提出一種新的安全機制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分式數據庫自主與強制性)安全機制。基於實體原理,設計了一個採用ddm安全機制的數據庫控制器? ? dds ( distributeddatabasesecure ,分式數據庫安全)控制器,並設置了dds安全控制器的安全控制機制。通過dds安全控制器在實踐中的應用,本文分析了dds安全控制器的各項功能和安全特點,設計了實際應用中dds控制器的管理方案,實現了分式數據庫安全控制。
  20. This paper tries to make use of the cellular automata ’ s sensitivity to the initial state called avalanche effect, by swiftly diffusing and confusing the plaintext to be hashed, a cellular automata based one - way hash function is proposed

    本文試圖利用細胞自動機某些演對于初態的雪崩效應,通過對列明文信息實現快速擴與混淆來構造單向hash函數。
分享友人