數息法 的英文怎麼說

中文拼音 [shǔ]
數息法 英文
breath-counting method
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. In the presented method, the point estimations of the model parameters, aandb in the new model, are given by the least square method. the confidence interval for the parameter b is given as well. an engineering illustration is used to compare the result of the presented method with those of amsaa - bise model and duane model

    該模型充分考慮了增長過程中的各種可得信,採用非參得到多臺系統在各同步停止試驗時刻的可靠度,並利用最小二乘擬合求得該模型中參a , b的點估計值,以及b的置信限。
  2. For further information on integer division, see

    有關整的詳細信,請參見
  3. Smtcpp parses to ci - - - programs by ll ( l ) method, extracts a lot of program ? information, such as classes, members and objects ; counts the indications, such as the number of method per class, the biggest complexity among methods, depth of inheritance tree, the number of children, coupling between object classes, response for class, and relative lack of cohesion in methods

    該工具利用ll ( 1 )分析對面向對象軟體的源程序進行語分析,提取程序中有關類、類成員、成員函等信,從而計算出類的方、方最大復雜度、繼承樹深度、孩子目、耦合度、響應集、相對內聚缺乏度等的度量結果。
  4. It is not easy to change our habits or magnetic field, which absolutely cannot be done by practicing some breath - counting method or yoga exercise. since the development of habits is controlled by the mind, we must change the mind in order to change our habits. methods contemplating on the solar plexus, on bones, water, or breathing are simply not enough

    要變改我們的習慣或磁場並不簡單,絕不是靠一些呼吸的方,或做一些瑜珈運動就能改變,因為習慣的養成是受頭腦控制的,所以要改變習慣,必須更改我們的頭腦,只靠觀丹田觀骨頭觀水觀呼吸等等都不夠用,唯有觀音門才是最究竟的方
  5. Mutual information algorithm use mutual information as a new matching criterion to measure the statistical dependence between the image intensities of corresponding pixels in both images, which is assumed to be maximal if the images are geometrically aligned

    互信則把信論中的互信作為衡量兩幅圖象配準的相似性測度函,假設當兩幅圖象配準時,互信達到最大值。
  6. Chapter four - this chapter introduces the functions of government authority such as accessing the appropriate tax on taxpayers ; defining ways to include taxes based on accounts and records ; explaining the calculation of tax based on valuations as well as discussing the concepts of legitimacy of tax notification, tax relief, tax refund, administrative remedy chapter five - this chapter examines the measures of collecting taxes and imposing interests, fines, tax preservation and tax execution when the taxpayers violate the tax law

    第四章-本章介紹征稅機關確定稅捐債務的功能,例如徵收定的金額、以會計制度為基礎的確定稅捐方、基於指評定稅收的方式以及討論課稅處分的律效力、稅務減免、退稅、行政救濟的概念。第五章-本章探討稅務機關征稅權利的行使以及對納稅人違反稅時課以過期利、處罰、稅務保全及稅務執行的手段,並且討論稅務機關征稅權因5年定期間屆滿而歸于消滅的問題。
  7. For offering the rules witch can be followed by economical credit reporting agency, china need to produce the law of credit from information as soon as possible, the standpoint of building the law of credit from information is that we must offer credit reporting agencies the necessary conditions they need as long as protect the rights of credit from information of the individual and business, the content of the regulation mentioned to lots of points of how to open the credit from information of the individual and business

    社會信用信的立思想是既要充分保證個人、企業信用權益不受損害,又要求個人、企業信用信對徵信機構進行開放,為徵信活動的正常開展創造必要的條件。其具體規制內容一是通過對所需開放的信用信范圍、開放原則、內容、方式的界定,在社會范圍內建立起一個適應徵信機構開展徵信業務的徵信據環境;二是通過對徵信機構在徵集使用信過程中對個人、企業信用信保護的相關規制,實現對企業和個人信用權的保護。
  8. Time delay was chosen by using autocorrelation function method and mutual information method, while reconstruct dimension was obtained by g - p saturation correlation dimension method and false nearest neighbor percentage method. furthermore, initial neighborhood radius was computed by the estimated noise level based on the g - p saturation correlation dimension method. secondly, a noise reduction of the inflow time series was carried out by chaotic nonlinear local projection noise reduction method, and the effects on noise to chaotic characteristics and state reconstruction parameters were discussed

    採用g - p關聯維計算關聯維; rosenstein和kantz計算最大lyapunov指;重構相空間的延遲時間採用了自相關函和互信;嵌入維採用了飽和關聯維和偽鄰近點;初始領域半徑的選取採用了基於g - p關聯維的噪聲水平的初始估計方
  9. A great lot of analysis and experimental results indicate that the experiential formula can give more exact order than traditional methods, such as a1c, b1c, cat and svd

    大量的試驗與計算機模擬表明,該經驗公式在簡訊號的分析中優于傳統的信量準則以及基於線性代的奇異值分解( svd )定階演算
  10. Wine endless aftertaste let people praise from wine also triggered numerous music from mozart ' s " champagne flavor, " fallia " wine smell, " vanessa " four seasons " in the fragment " with the grape harvest women happiness ", one we can bring wine gleaned masters of creative inspiration

    葡萄酒的無窮回味讓人們稱頌,由葡萄酒引發的音樂作品也不計其,從莫扎特的《香檳氣》 ,里雅的《葡萄酒的香味》 ,維瓦爾第《四季》中的片斷《葡萄收獲與女人們的快樂》中,我們能一窺葡萄酒帶給大師們的創作靈感。
  11. The main methods of this thesis are as following : chaotic time series is created by dynamics equation, then use gp algorithm to calculate embedding dimension and mutual information algorithm to calculate delay time. based on takens embedding theorem, the method utilizes the observed values of single variable of chaotic system to reconstruct phase space

    論文首先求解動力學方程組產生混沌時間序列,然後用gp演算確定嵌入維、互信求出延遲時間,再根據takens嵌入定理,利用混沌系統的單變量觀測值對混沌背景重構相空間。
  12. For more information about argument syntax, see

    有關參的更多信,請參見
  13. If the status is anything other than success, the application can call the error functions, methods, or objects to retrieve the error information

    如果狀態不是成功,應用程序可以調用錯誤函、方或對象來檢索錯誤信
  14. Now scholars and institutions are producing a growing volume of research on leading indicators. the study have three characteristics, positive analysis are less than normative analysis, provincial research are less than national research, and research methods get behind

    三是研究方基本上沒有脫開景氣指的框架,固定在先行、同步、滯后指標模式上,先行指標的遴選方單一,大多是時差相關分析方和k - l信
  15. In this thesis, a semi - classical model of the force on an atom is used to describe the motion of a two - level atom interacting with a standing wave laser field. the velocity dependent force and momentum diffusion are derived through optical bloch equations by using the matrix form of the continued fraction technique. by investigating the dynamic properties of atoms in laser field, we can control and manipulate the mechanical motion of an atom

    本文利用半經典理論,從二能級原子在激光駐波場中所滿足的運動方程出發,推導出密度矩陣元所滿足的遞推關系,利用矩陣連分求解出密度矩陣元,從而求出依賴于原子運動速度的光壓力與動量擴散系,通過討論原子在激光場中的動力學行為,為原子在激光場中被囚禁、形成原子列陣以及可控制的量子態,從而為量子信處理提供理論基礎。
  16. It reframes the traceback problem as a polynomial reconstruction problem, and uses techniques from algebraic coding theory to provide robust methods of transmission and restriction. the scheme is a new solution to the traceback problem during a dos attack ; the honeypot for ddos, which is a tool of traceback, lures the attacker to believe that he successfully compromised a slave for his needs, convincingly simulating the architecture of a potential ddos attack ; the source - based approach to ddos defense, which is a useful adjunt to traceback systems, deploys a ddos defense system at source - end networks. attacks are detected by monitoring two - way traffic flows, and the attacks originating from source networks are stopped by rate - limiting ; the routing mechanism based on pushback treats ddos attacks as a congestion - control problem

    最後,就有關ddos攻擊反向追蹤問題,從四個方面對其解決方案進行了研究:在分析比較幾種反向追蹤演算的基礎上,著重研究了代編碼反向追蹤信的方案,該方案把追蹤重構問題當作多項式重構問題,使用代編碼理論技術提供魯棒的傳送和重構方,是dos攻擊過程中的反向追蹤問題的一種新的解決方; ddos陷阱作為反向追蹤的工具,引誘攻擊者相信自己成功與所需的傀儡主機通話,令人信服地模擬出潛在ddos攻擊體系結構;基於源的ddos防禦方作為反向追蹤有用的補充,將防禦系統部署在源網路,通過監控雙向流量檢測攻擊和限制速率終止來自源的攻擊;基於向後倒推的防禦ddos的路由機制把ddos攻擊看作擁塞控制問題,添加功能到每個路由器來檢測並優先丟棄可能屬于攻擊的包,通過向後倒推上級路由器也得到通知而把這樣的包丟棄。
  17. Second, based on the theory of synthetic discriminant function, several sub - reference images were synthesized to form the reference image base to realize rotation distortion - invariant recognition, which also solved the ill - problem of synthesizing a single reference image with the whole training distorted images and made the pose estimation easier. third, the phase - encoding and amplitude modulation distortion - invariant jtc for multi - target recognition were described

    其次,論文採用綜合識別函構成子參考圖像,建立參考圖像庫的方解決了目標旋轉畸變不變的識別問題,克服了由大量訓練圖像合成單幅參考圖像時,高頻信損失嚴重的病態問題,並可實現對真實目標旋轉姿態的估計。
  18. The optimum delay time is evaluated by the average mutual information method ; this method is more precise than the autocorrelation method

    利用平均互信確定重構時延參,相比于自相關函,這個方更加準確。
  19. Most take the form of some proprietary query language that maps sections of an html page into code that populates a database with information from the web page

    大多都採用一些專用查詢語言的形式把html頁面的各個部分映射成代碼,而這些代碼將web頁面上的信填入到據庫中。
  20. In the applied part, kernel method is used to improve the method of classification with one class training data. the improved method is combined with ground plane transformation method, so that information from monocular vision and stero vision can be fused effectively. based on this, a demo system of obstacle detecting in outdoor scenes is developed

    在實踐應用部分,本文利用核函,改造了現有的單類判別方,並結合雙目視覺技術中的重投影方,實現了單、雙目信的有效融合,研製了一個自然場景下的障礙檢測實驗演示系統。
分享友人