最高優先數 的英文怎麼說

中文拼音 [zuìgāoyōuxiānshǔ]
最高優先數 英文
highest priority number
  • : 副詞(表示某種屬性超過所有同類的人或事物) most; best; worst; first; very; least; above all; -est
  • : Ⅰ形容詞1 (從下向上距離大; 離地面遠) tall; high 2 (在一般標準或平均程度之上; 等級在上的) above...
  • : 名詞1 (時間或次序在前的) earlier; before; first; in advance 2 (祖先; 上代) elder generation; ...
  • : 數副詞(屢次) frequently; repeatedly
  1. Precedence is either an integer or the special token force

    和特定符號的
  2. Optimal design with three variables is then done to the elbow - bar mechanism of the mp1040b moulding machine by utilizing the method of punishing function for constraint problems and variational scale for unconstraint problems. the optimal target function is the maxium of gradient in one work travel for the moulding plank of the elbow - bar mechanism. the result shows that the maximal gradient of moulding plank in one motion period declines by 25. 7 after optimization, and the angular acceleration of the bottom moulding plank decreases greatly

    動力學分析中,各構件的質量和轉動慣量是通過pro / engineer軟體,建立各個構件幾何模型而求得;然後,利用解決約束問題的罰函法和處理無約束問題的變尺度法對mp1040b型模切機肘桿機構進行三個設計變量的化設計,化目標函為肘桿機構的下模切板在一個工作行程中達到的大傾斜程度;通過化設計,模切機肘桿機構的下模切板在一個工作行程中的大傾斜程度降低了25 . 7 ,其角加速度明顯減小,提了模切機動力學性能。
  3. With the setting of the peculiar conditions, we contribute the above system model for the first time to a kendall model, i. e. / l, : the size of buffer 1 / fcfs ( for same kinds of cells ) / l2 : the size of buffer 2 / non - prevail pr ( for different kinds of cells ) we resolved the model by " state transfer " method

    在設定工作環境及條件的基礎上,本論文首次為該系統模型建立了肯達爾排隊模型。即:並運用狀態轉移方法進行了解析。後的模擬實驗據表明級調度輸入?線群多通道輸出atm交換系統模型較好地改善了hol阻塞,提了輸入排隊atm交換網路的性能。
  4. First, we have expatiated the working principle, performance parameters and major technologies. farther, we have analyzed the shortcomings of the existing catalog search engine and introduced the clustering analysis and the ant algorithm ; on the basis of this, we discussed the possibility and necessity of the connection between them, which avoids the local optimization of the clustering analysis to a degree. in the end, we appraise the idea that we deal with the information data by the data structure of the binary tree, m - branch tree and tree established by the ant algorithm, which can improve the efficiency of the search engine

    闡述了搜索引擎的工作原理,性能指標,主要技術;分析了現有目錄式搜索引擎的缺點,接著介紹了聚類分析演算法與螞蟻演算法的理論,並論述了二者結合的可能性和必要性,這種結合方法也在一定程度上克服了聚類分析演算法容易陷入局部的缺點,終提出了通過使用螞蟻演算法建立二叉樹、 m叉樹和樹作為信息據處理的思想,大大提了搜索引擎搜索的效率。
  5. The thesis consists of four sections. in section one, we introduce some background of the topic, in section two we review some basic and recent results about the structure and hierarchies of the computably enumerable degrees which are closely related to our topic - the algebraic structure of the plus cupping turing degrees, in section three, we outline the basic principles of the priority tree argument, one of the main frameworks and tools of theorem proving in computability theory, and in section four, we prove a new result concerning the algebraic structure of the plus cupping turing degrees that there exist two computably enumerable degrees a, b such that a, b ? pc, and the join a v b of a and b is high

    本篇論文分為4個部分:第一部分介紹了這個領域的一些背景知識;第二部分主要回顧了前人在研究可計算枚舉度的結構和層譜時所取得的一些基本和新結果,這些結果與我們的主題?加杯圖靈度的代結構密切相關;在第三部分中,我們概要的描述了樹方法的基本原理,此方法是可計算性理論中定理證明的一個重要框架和工具;第四部分證明了一個加杯圖靈度代結構的新結果:存在兩個可計算枚舉度a , b ,滿足a , b pc ,而且a和b的並a b是一個度。
  6. A novel dynamic evolutionary clustering algorithm ( deca ) is proposed in this paper to overcome the shortcomings of fuzzy modeling method based on general clustering algorithms that fuzzy rule number should be determined beforehand. deca searches for the optimal cluster number by using the improved genetic techniques to optimize string lengths of chromosomes ; at the same time, the convergence of clustering center parameters is expedited with the help of fuzzy c - means ( fcm ) algorithm. moreover, by introducing memory function and vaccine inoculation mechanism of immune system, at the same time, deca can converge to the optimal solution rapidly and stably. the proper fuzzy rule number and exact premise parameters are obtained simultaneously when using this efficient deca to identify fuzzy models. the effectiveness of the proposed fuzzy modeling method based on deca is demonstrated by simulation examples, and the accurate non - linear fuzzy models can be obtained when the method is applied to the thermal processes

    針對模糊聚類演算法不適應復雜環境的問題,提出了一種新的動態進化聚類演算法,克服了傳統模糊聚類建模演算法須事確定規則的缺陷.通過改進的遺傳策略來化染色體長度,實現對聚類個進行全局尋;利用fcm演算法加快聚類中心參的收斂;並引入免疫系統的記憶功能和疫苗接種機理,使演算法能快速穩定地收斂到解.利用這種效的動態聚類演算法辨識模糊模型,可同時得到合適的模糊規則和準確的前提參,將其應用於控制過程可獲得精度的非線性模糊模型
  7. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然後用模糊識別方法中的小距離原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參序列的研究,提出了基於euclidean距離的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提了檢測系統的強健性和可伸縮性;特徵據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度原則,分析和處理信息表中的頻度行為特徵,提檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  8. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首介紹並分析了橢圓曲線密碼體制的點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和正規基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項式基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項式基和正規基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳形法,提了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  9. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首對聚類分析的遺傳演算法進行了研究,討論了聚類問題的編碼方式和適應度函的構造方案與計算方法,分析了不同遺傳操作對聚類演算法的性能和聚類效果的影響意義。然後對k - means演算法中初值的選取方法進行了分析和研究,提出了一種基於遺傳演算法的k - means聚類改進(混合聚類演算法) ,在基於均勻采樣的小樣本集上用k值學習遺傳演算法確定聚類k ,用遺傳聚類演算法的聚類結果作為k - means聚類的初始聚類中心,後在已知初始聚類和初始聚類中心的情況下用k - means演算法對完整據集進行聚類。由於遺傳演算法是一種通過模擬自然進化過程搜索解的方法,其顯著特點是隱含并行性和對全局信息的有效利用的能力,所以新的改進演算法具有較強的穩健性,可避免陷入局部,大大提聚類效果。
  10. In addition to electrical and electronics goods, the " best " flagship store will have several zones dedicated to niche products : a home theatre section with high - end audio - visual equipment ; a hi - tech hi fi section showcasing premium - brand audio equipment ; and an hdtv section, where customers can experience the ultimate in high - definition tv. another unique feature of the store will be a special relaxation area designed to enrich the customer shopping experience. mr chu ip pui, executive director, kerry real estate agency limited, noted at the signing ceremony : " best is not only a new tenant of megabox, but also our best partner for tapping the huge market potential for a better quality of life through the application of quality electrical and electronics products

    Megabox的香港好電器店內除了傳統電器電子產品外,店鋪內特別劃分了多個專區,包括頂級家庭影院專區home theatre section ,展示一系列進的影音設備,將家居提升成為豪華私人影院,滿足星級的視聽享受另有科技喇叭音響系統專區hi - tech hi fi section ,網羅各地名牌音響產品此外更配合碼廣播時代的來臨,特設具備清顯示器材的電視機專區hdtv section ,讓顧客現場享受質的畫音電視節目此外,店內亦首創設置顧客憩息區,讓顧客可以在閑適的環境中,細意挑選及欣賞各種進電子產品,盡情享受整個購物體驗。
  11. Based on experiments and theory analysis in the past, here we present the most important technology conditions that affecting photosensitivity : 1 、 cycle times, experiments showed that with the increase of cycle times, photosensitivity got worse ; 2 、 h dilution ratio, with the continuously increase of h dilution ratio, h ’ s bombardments on the growing surface enhanced continuously too. these bombardments can eliminate high - energy default configurations priorly and leave stable configurations behind. therefore, growing layer ’ s configurations are impacted ; default state density is decreased and photosensitivity is improved

    Layer - by - layer方法的制備工藝條件很多,我們在以往實驗和理論分析的基礎上,介紹了對光敏性影響為重要的工藝條件: 1 、循環次的影響,實驗表明隨著循環次地增加,光敏性變差; 2 、 h稀釋比的影響,隨著h稀釋比的不斷增加, h對生長表面的轟擊不斷增強,這些轟擊能消除能缺陷結構而留下穩定的結構,從而使生長層結構緻密,減少缺陷態密度,提薄膜的光敏性。
  12. Get the main conclusion as follows : when producing advantage enterprises in horizontal merger, if the figure of leaders enterprise do n ' t equal to zero, the horizontal merger motive exists, and under certain condition, this kind of horizontal merger will increase the social total welfare, this is exactly the reason why horizontal merger gets support ; when horizontal merger does not produce advantage enterprises, the condition that the motive exists is extremely harsh, and this kind of merger rises the product price and reduce the social total welfare ; when the market is couront market, if merging side ' s production capacity after merge ca n ' t reach optimum in theories satisfied, so long as its production capacity exceed the sum of optimum output of merger participate, merge motive exists, and horizontal merger will increase the social total welfare rises ; when high - level enterprises merge low level enterprises, because merging side ca n ' t get profit or those do n ' t participate in merger get more profit than merging side, motive

    得到主要結論如下:當橫向並購產生勢企業時,原市場的領導層企業目不等於零時,橫向並購動機存在,而且在一定條件下,這種橫向並購會使社會福利增加,這正是橫向並購得到支持的原因所在;當橫向並購不產生上勢企業時,動機存在的條件極為苛刻,基本上與不產生勢企業的假設相違背,可以認為這種並購的動機不存在,而且這種並購導致產品價格上升,社會總福利降低;如果市場近似古諾競爭市場,並購后並購方生產能力不能滿足理論上的產量,只要其生產能力超過並購前參與並購各方的產量之和,那麼並購動機就會存在,而且橫向並購會導致產品價格下降,社會總福利上升;當處于層次的企業並購低層次企業時,由於並購者不能獲利或者未參與並購者獲利增加比並購方多,並購動機不存在或者很微弱。
  13. My net assistant can optimize settiongs automatically, if you are an advanced user, you can optimize settings manually ; backup and restore with the optimization, the ones that can make users relaxed will resume the state before optimized, in order to ensure the system security. 2. maxmtu automatically discovery : specifies whether microsoft tcp ip will attempt to discover the largest packet size the mtu over the path to a remote computer

    1 .領的網路化項目,全面提升網路性能:軟體開發組通過對windows操作系統環境9x me nt 2000 xp 2003下的500臺電腦的實際評測分析,自主分析評測出絕對領的多達29項的網路化項目,通過智能化的自動化向導,將網路系統參設置得更合理,讓用戶的網路性能發揮到點為方便級用戶,軟體內置了詳細的自定義手工化系統,可以更精確的設置各個項目安全進的系統同步備份與還原功能,可以讓用戶輕松的將系統恢復到化以前的狀態,以保障系統的化安全。
  14. Reconfiguration approach of distribution network based on both system reliability and feeder loss is presented in this paper. being an objective function both to maximize the reliability and to minimize the loss of network, constraint conditions are considered as operation limits. an optimal method of the minimizing both the average service unavailability index and feeder losses is described in this paper

    本文以配電網可靠性、網路損耗低為目標函,以配電網的運行滿足電力連續供應為約束,提出了基於排序選擇、對違反約束個體進行直接比較的改進自適應遺傳演算法,對配電網的可靠性按照深度搜索小路進行計算,對系統的網路損耗按照牛頓? ?拉夫遜法進行計算。
  15. Huandao tide hotel was granted " national top star - rated hotels. in china " in 95 and 96 for good quality and high efficiency service. air conditioning, baby - sitting, beauty salon, health club, night club, money exchange, outdoor swimming pool, interpreter, shopping arcade, sauna, sightseeing bus, tea coffee boiling pot, airline desk, business center, conference facilities, clinic, hair - dryer in the bedroom, fitness room, room service, idd, sauna, tv, laundry service, lounge

    寰島泰得大酒店以質,效的服務連續95 , 96年被授予"全國佳星級酒店" ,並後榮獲了歐洲酒店協會頒發的榮譽獎"金獎"和美國質服務科學協會頒發的國際星級服務頂級榮譽"五星鉆石獎" .酒店還成功接待了十位外國元首,政府首腦及多國際,國內知名公司的大型會議,酒店一流的設備和盡善美的服務受到了貴賓及社會的一致好評
  16. According to harvard ' s stephan thernstrom, an opponent of racial preferences, the new system ensures a higher minority graduation rate by not accepting students incapable of doing well at the best colleges

    根據一名反對種族的人士、哈佛大學的斯蒂芬?塞恩斯托姆的說法,由於好的大學不再錄取那些學習能力較差的學生,新政策確保了少民族學生較的畢業率。
  17. Further more, we improve the nearest neighbor approximation method by calculat e mixtures ordered by likelihood of being the best scoring mixture. the likelihood is calculating from previously processed data. this improved method can reduce recognition time by 15. 56 % compared with standard viterbi beam search algorithm

    本文對近鄰快速估算方法進行改進,在搜索過程中根據已處理過的據統計出各個斯混合分量產生概率的概率,並依此預測隨后的計算中有可能產生概率的斯混合分量,計算更有可能產生概率的斯混合分量,使標準viterbibeam搜索演算法的搜索速度提了15 . 56 。
  18. In the scheme, not only the rtlinux ' s double kernel structure and its virtual interrupt are adopted, which make the standard linux process as the lowest priority one in the real - time kernel, but also the 8254 is set to work in the one - shot model by using the kurt ' s utime package, which improves the clock frequency of the os and reduces the cpu ' s extra burden

    這種新的實時化方案利用了rtlinux的雙內核體系結構和中斷虛擬機技術,將標準linux進程作為實時內核的一個低的任務進行調度;同時還利用了kurt中utime軟體包將定時/計器8254置為one - shot工作模式,從而既提了操作系統的時鐘頻率,又解決了cpu額外負擔過重的問題。
  19. The government will make it a " top priority " to relieve poverty among china ' s ethnic minorities

    中國政府將制定少民族貧困救濟享有權的政策。
  20. As the application of distributed computing is used much more widely , distributed database becomes a significant part of information management it avoids a lot of disadvantages of conventional centralized database , and is applicable to many situations distributed database is a set of data which is the unity logic , but in fact these data is located on different sites it is of high availability , easy expansibility , high concurrency , high efficiency and etc in distributed system , data redundancy is a method to improve the speed of query and the availability of system distributed query should shield the lower level details of data redundancy from end users , distributed transaction should ensure data from disaccord this paper introduces basic conceptions of distributed database firstly , discusses distributed transaction and concurrent control , describes the development prototype mysql ’ s characters , architecture and executive mechanism , then shows the skeleton model of dpsql and exposes the strategy and algorithm of distributed query and distributed transaction , at last analyzes the extra expenses and response delay of distributed processes this paper exposes the implementation mechanism of distributed query and distributed transaction emphatically distributed query uses the strategy of “ read one , write a11 ” s0 in such a system if user ’ s requests are read - - only for the most part and the distribution of data redundancy is plausible , efficiency is very high distributed transaction uses two - 。 phase commit protocol to ensure the consistency of global data , which has less communication overhead

    分散式查詢需要向用戶屏蔽據冗餘分散的底層細節,分散式事務處理要保證全局據完整,這都是傳統集中式據庫不曾面臨的問題。本文首介紹了分散式據庫的概念性問題;接著討論了分散式事務涉及的定義及演算法;然後描述了dpsql的原型mysql的特性、結構和執行機制;繼而給出了dpsql的梗概模型,闡述了實現分散式查詢和分散式事務處理的策略及演算法;後分析了進行分散式處理給系統增加的額外開銷和客戶端的額外響應延遲。本文重點描述了分散式查詢和分散式事務處理的實現機制,分散式查詢採用」讀一個寫全部」的本地策略,在讀操作頻繁的系統中,只要庫的分佈合理,單機效率極,幾乎無任何附加開銷和延遲,而以整個系統的角度看來,吞吐量就更是于單機系統;分散式事務處理採用兩階段提交協議,通信次較少並能確實保證副本一致。
分享友人