整列法則 的英文怎麼說

中文拼音 [zhěngliè]
整列法則 英文
alignment rule
  • : Ⅰ形容詞1 (全部在內; 完整) whole; all; complete 2 (整齊) neat; tidy; orderly Ⅱ動詞1 (整理; 整...
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • 法則 : rule; law
  1. 1 adjective law is regarding as the main content of bankruptcy reorganization institution, the core of bankruptcy reorganization institution is the bankruptcy reorganization procedure formed from a series of procedural rules. the bankruptcy reorganization procedure has the characters of loose conditions, specifically objects, diversiform participants, diversiform measures and procedural priority

    一、破產重制度以程序為主要內容,其核心就是由一系程序性規構成的破產重程序,破產重程序具有條件寬松、對象特定、主體多元、措施多樣、程序優先等特徵。
  2. This paper studies several interestingness and contingency table standardization to find a more robust algorithm instead of using support and confidence

    通過對有趣度參數和聯表規化的研究,進一步改進了對關聯規挖掘演算
  3. A dynamic hierarchical description method for workflow is presented. the method provides a dynamic hierarchical way to define a workflow with non - determinate or dynamic factors. with this method, the main process defined at build - time can be reified and extended by the principle of the sub - organizations at either the build - time or the run - time. to ensure the consistency and integrity of the description, a series of constraint rules are also discussed to realize seamless integration between a decomposed process and its original one. this approach supports the description of unpredictable uncertainties, the dynamic hierarchy of business process, and the dynamic modification of enterprise organizations, and all of these improve the flexibility and extendability of workflow management systems dramatically

    為支持流程中不確定性因素和動態因素的描述,提出了柔性工作流的動態層次描述方,使得流程設計人員在流程定義階段定義的主流程可以在任意時刻由子組織的負責人進行細化和擴充.為保證動態層次描述的正確性和完性,討論了動態層次描述的一系約束規,確保分解后的流程與原有流程實現無縫銜接.該描述方支持對不可預知的非確定性因素的描述,支持業務流程的動態層次描述以及組織機構的變化,極大地增加了工作流管理系統的柔性和可擴展性
  4. Complete command names adhere to the following syntax rules

    的命令名遵守下
  5. The feasibility of decomposition of transition firing sequence, the application of them in the detecting lfs and the reverse course of decomposition - synthesis are discussed. they provide theoretic basis for our algorithm in the field of petri net. supported by the above, two main part is included in the algorithm : at first, x is transacted according to the following method in order to get a set of xb named as basic vector of x which is the firing count vector of a directed path without circle if md is reached from m0 in the rg ( m0 )

    在變遷序分解的指導思想下,我們的演算主要通過以下兩步工作完成: ( 1 )首先對給出的已知條件中滿足狀態方程的n維非負數向量進行處理,得到一組x的基礎向量x _ b ,使得在petri網的可達標識圖中,若存在一條由m _ o到m _ d的有向無環路,x _ b為這樣的路上變遷引發序的發生數向量。
  6. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序建立模糊子集b ,然後用模糊識別方中的最小距離原進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序的研究,提出了基於euclidean距離的入侵檢測方edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方的不足。
  7. Firstly, e - hmm is used to parameterize face image, the output likelihood of the e - hmm is encoded to form the input vector and is sent to the ann. by taking advantage of the discriminative training of ann, the weak discrimination of the maximum likelihood criterion can be improved, and the recognition performance can be improved by means of the learning ability of ann

    該混合識別網路用e - hmm的參數來描述人臉的體性和局部細節性特徵,用e - hmm的輸出似然值序組成ann的輸入矢量,利用ann的鑒別訓練能力來克服e - hmm的基於最大似然準訓練演算區分力較差的弱點,同時利用ann的學習能力來提高e hmm的識別性能。
  8. The simulation on synthetic data is made and the result is discussed. 5 ) by using borland c + + builder and matlab, a semi system, i _ miner, is developed to mine association rule. it can realize other functions just as data cleaning, data transform, etc. furthermore, i _ miner is applied to an actual industry database

    提出用趨勢變換序dtw距離做篩選的搜索方,有效提高個搜索效率,並在模擬數據庫上進行模擬實驗,並對實驗結果進行分析和討論; 5 )以borlandc + + builder和matlab為開發平臺,設計一個進行關聯規挖掘的準系統i _ miner ,可以實現數據預處理,數據變換和關聯規挖掘等工作。
  9. Abstract : biological invasions are a continuous feature of a non - equilibrium world, ever more so as a result of accidental and deliberate introductions by mankind. while many of these introductions are apparently harmless, others have significant consequences for organisms native to the invaded range, and entire communities may be affected. here we provide a survey of common models of range expansion, and outline the consequences these models have for patterns in genetic diversity and population structure. we describe how patterns of genetic diversity at a range of markers can be used to infer invasion routes, and to reveal the roles of selection and drift in shaping population genetic patterns that accompany range expansion. we summarise a growing range of population genetic techniques that allow large changes in population size ( bottlenecks and population expansions ) to be inferred over a range of timescales. finally, we illustrate some of the approaches described using data for a suite of invasions by oak gallwasps ( hymenoptera, cynipidae, cynipini ) in europe. we show that over timescales ranging from 500 10000 years, allele frequency data for polymorphic allozymes reveal ( a ) a consistent loss of genetic diversity along invasion routes, confirming the role of glacial refugia as centres of genetic diversity over these timescales, and ( b ) that populations in the invaded range are more subdivided genetically than those in the native range of each species. this spatial variation in population structure may be the result of variation in the patchiness of resources exploited by gallwasps, particularly host oak plants

    文摘:生物入侵是不均衡世界的一個永恆話題,尤其是當人類有意或無意地引入物種后.很多引入顯然是無害的,但另外一些有著嚴重的後果,會給入侵地的生物以至於個生物群落造成影響.本文總結了分佈區擴張的常見模式,概述了它們對遺傳多樣性和種群結構式樣所造成的影響.描述了如何根據以一批遺傳標記所得到的遺傳多樣性式樣來推斷入侵途徑,來揭示伴隨擴張選擇和漂變在形成種群遺傳樣式中的作用.本文對日益增多的群體遺傳學方進行了總結,這些技術可以用來在不同的時間尺度上推斷種群規模所發生的巨大變化(瓶頸效應及種群擴張) .最後,我們以歐洲櫟癭蜂(膜翅目,癭蜂科,癭蜂族)一系入侵的數據為例對一些方進行了說明.從500 10000年的時間尺度上,多態的等位酶位點上等位基因頻率的數據表明: 1 )遺傳多樣性沿入侵路線呈不斷下降的趨勢,支持了冰河期避難所作為遺傳多樣性中心的作用; 2 )入侵地區的種群與該物種原產地的種群相比,遺傳上的分化更為強烈.這種種群結構在空間上的變異可能是被櫟癭蜂開發的資源尤其是櫟樹寄主在斑塊上出現變異的反映
  10. Most current algorithms only work well in special conditions, because of the abnormity of signals in the real world. now, the research in the ica arises much passion and the ica has brought about many applications. the primary results the writer has got are as the following : after a whiting process, it is a key to find an orthogonal matrix to throw away the high - order redundant information between components

    由於現實生活中信號十分不規,目前提出的演算大多隻能針對某類信號分離,鑒于目前在ica方面極大的研究熱情和強大的背景支持,作者對ica離線演算做了一定研究,主要內容和工作包括如下: ica問題經過白化處理后,尋找去除高階相關的正交矩陣成為問題關鍵,而正交矩陣具有特殊的空間結構,組成它的每個向量可視作rn中單位超球表面上一點,當這些點彼此垂直時,體就組成一個正交矩陣。
  11. We also prove the following properties : the stable states of the network in the same sh orbit have a same dynamical behavior, such as the size of attraction basin and the energy ; the relation of the symmetry of two isometric networks h and h ' = g - h is s ' h = g - sh - g ~ } for any isometry g, where sh and s ' h are the symmetry of h and h " respectively ; the isometry will not change the dynamical properties of the stable states set of the corresponding networks ; etc.

    ) g的對稱性s _ h和s _ n的關系為s _ h = g ? s _ h ? g ~ ( - 1 ) ;等距變換不會改變網路穩定態集的動力學性質等一系的結論。所有這些研究結果表明了hebb學習是通過調網路的連接矩陣,使得其的結構的對稱性包含存儲樣本集的對稱性這一存儲機理。
  12. The goal now of u. s. policy has to be to regain the initiative where saddam hussein is concerned ; to take a hard look at what we are doing, to make sure that he does not build weapons of mass destruction, that he does not threaten his neighbors ; to make certain that he lives up to the obligations that he undertook after the end of the gulf war

    在廣泛完且具彈性的執行計劃中,有民事行政行動、民事司行動及刑事行動。重大罰是民事制裁當中很重要的一環。正式行政命令的處分可包含每個違日高達27 , 500美元的罰鍰,或吊銷、撤銷違設施的許可證或臨時許可。
  13. At last the paper uses fully learning data according celts, constructs theory and methord of implementing system. the theory has two aspects : gives imprecise learning methords using rules when sequencing initially, such as introducing, narrating emphases and so on ; during the process of learning, we construct a fuzzy evaluating model using the data of scores, learning time and browsing times, and adjust scores with learning objects. then we can inference more precice learning strategy based on the result of evaluation, such as searching previous knowledge units, learning current knowledge units repeatly

    該原理主要體現在兩個方面:一是在初始編時,根據規的匹配與調用可以實現較為粗略的教學方指導,如一般性介紹、重點講述等;二是在過程導學當中,針對最具代表性的測驗成績、學習時間、瀏覽次數的學習效果和行為,結合學習者的預期學習目標等因素進行適當的成績調、時間改進等處理,並運用模糊綜合評判的方對學習者實施有效評價,以推理出在學習過程中較為細化的教學建議,如搜索前驅知識單元、重新學習當前知識單元等。
  14. The traditional methods of times series can not be used for the unit root process. but economic phenomenon has long term equilibria relationship between each other, so we can seek cointegration for the multi - unit root process. if they have cointegration relationship, there must be long term equilibrium among them while other factors act as short - term impact

    對于具有單位根過程的經濟指標數據,傳統的時間序不能使用,但是經濟現象往往又表現出它們之間具有的長期均衡關系,因此,對于多個單位根過程,可以尋求它們之間的協關系,如果經濟指標之間具有協關系,它們之間就具有長期均衡關系,而其它因素的作用只是短期隨機沖擊而已。
  15. 12b revised april 1999 for developments within deep bay area, which stipulates that a " precautionary principle " should be taken to preserve the intrinsic value of fishponds and the principle of " no - net - loss in wetland " should apply to both wetland area and ecological functions so as to maintain the integrity of the deep bay wetland ecosystem as a whole

    9 . 5公頃的濕地凈減少違反了城市規劃委員會擬於後海灣地區內進行發展的規劃指引規劃指引編號12b 。指引明應採用防患未然的方,以保護和保育魚塘現有的生態功能。而不會有凈減少的原應指面積和功能兩方面,以維持后海灣濕地生態系統的體生態完
  16. Such methods are generally decreasing method, such as, feasible direction methods, constrained variable metric methods, etc. another class is sub - problems method, which approximates the optimal solution by solving a series of simple sub - problems, such as penalty function methods, trust region methods, and successive quadratic programming sub - problems, etc. the same property of two classes of methods is that they determine whether the next iterative point is " good " or " bad " by comparing the objective function value or merit function value at the current point and next iterative point

    另一類叫做子問題演算,這種演算是通過一系簡單子問題的解來逼近原問題的最優解,如罰函數、信賴域演算、逐步二次規劃演算等。這兩類演算的一個共同特點是,通過比較當前點和下一個迭代點的目標函數值或評價函數值來確定迭代點的「優」或「劣」 ,若迭代點比當前點「優」該迭代點可以被接受,否須繼續搜索或調子問題。
  17. Thirdly, by introducing fuzzy theory into system evaluation, evaluating student, teaching, course resource, and function of whole system. fourthly, making use of learning from examples based on information theory, machine learning algorithm is improved and machine learning decision tree is realized. finally, on reasoning mechanism, combining means of two classes reasoning is taken

    第三,在系統評價中引入了模糊理論,對學生、教學、課程資源以及系統的體功能進行了評價;第四,採用基於信息論的示例學習,改進了決策樹學習演算,並建立了機器學習決策樹;第五,在推理機制上,採取兩級推理相結合的方進行推理,即用基於語義網路的模糊推理確定教學序,用基於產生式規的推理確定教學方,並給出了詳細的推理演算
  18. First is the restriction of company law about the related transactions, brings up policies ideas about amending company law through drawing lessons from legislation experience of the western countries. next is the restriction of negotiable securities law about the related transactions, brings up policies ideas about amending negotiable securities law. finally, brings up to coordinate the conflict in the law items, and to strengthen the connection of the legal rules

    首先是我國上市公司關聯交易的公司規制,借鑒西方國家關聯交易立經驗,提出了修訂我國《公司》的立建議:拓展公司調對象,突破公司,重新構架公司制度安排,北方工業大學學位論文從事前保護和事後救濟兩方面確立了一系旨在保護上市公司中小股東及債權人利益的制度:然後是我國上市公司關聯交易的證券規制,提出了修訂我國《證券》的立建議:明確規定加公司關聯蝎的信息披露制度;最後,提出應協調律條文的沖突,加強律規范的銜接。
  19. The management of the fire fighting archives refers to the process of transforming the file materials collected and identified by classifying, arranging, login directory, technical process, and bookbinding according to certain regulations, methods and procedure

    消防檔案材料的理,就是將收集到的並經過鑒別的檔案材料,按一定的規、方和程序,以獨立的單位進行分類、排、登記目錄、技術加工和裝訂,使之轉化為消防檔案。
  20. According to specialists ? experience, such dangerous factors as water temperature, water pressure, oxygen density in the tank, the temperature and pressure of water vapor, ect. as well as control rules are made out in safety regulations for oil tankers. by using fuzzy logic ( min - max reasoning ), all sorts of fuzzy information are processed so as to simplify the control procedure in addition to realize it

    其方是利用模糊邏輯控制的優點,不需建立精確的數學模型,根據專家的經驗,油輪安全規制定出各危險因素(如水溫,水壓,氧氣濃度,壓力,溫度等)的模糊隸屬函數和一系的控制規,利用模糊邏輯( min max )來處理各種模糊信息,使個推理過程運算簡單易於實現。
分享友人