檢驗符號 的英文怎麼說

中文拼音 [jiǎnyànháo]
檢驗符號 英文
check symbol
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ名詞1 (符節) tally (with two halves made of wood bamboo jade metal issued by a ruler to gener...
  • : 號Ⅰ名1 (名稱) name 2 (別號; 字) assumed name; alternative name3 (商店) business house 4 (...
  • 檢驗 : checkout; test; examine; inspect; verify; survey; check;checking;testing;[英國]jerque(指檢查船舶...
  • 符號 : 1 (記號; 標記) character; sign; symbol; mark; code; notation; expression; denotation; sentinel ...
  1. Verification of print quality of bar code for commdity

    商品條碼印製質量的
  2. Ophthalmic optics - visual acuity testing - standard optotype and its presentation iso 8596 : 1994 ; german version en iso 8596 : 1996

    眼科光學.視力.標準視力及其演示
  3. One is the evt - based var model ( including gev model and gpd model ), the other is the quantile regression var model. secondly, i evaluate predictive performance of a selection of var models for chinese stock market data. these var models include riskmetrics method, historical simulation, monte carlo method, and the three recent models based on quantile regression and extreme value theory

    本文首先重點探討了極值分佈var模型(包括廣義極值分佈和廣義帕雷托分佈兩個模型)和分位數回歸var模型;然後在此基礎上將六個var模型(包括上述三種模型、歷史模擬法、 riskmetrics方法以及蒙特卡洛法)實證應用於估計上證指數、上證180 、深證成指、深證綜指95 var和99 var ;同時採用區間預測法、損失函數法和法對這些var模型進行了選擇評估。
  4. Second, the procedure of estimating test equating coefficients may be dull or complex, in this thesis, a uniform procedure, which not only improve the computing efficiency, but also is the base of comparison of various equating methods, is given. third, because the comparison of equating methods is a major part on test equating research, there is not a reliable criterion up to now, in order to compare the new methods with the existing ones, in this thesis an objective approach is given. the new a pproach consists of three steps : 1

    最後,由於等值方法優劣的比較是等值研究的重要內容,但迄今為止沒有一個合理的比較標準,為了比較新導出的等值方法和原有等值方法之間的優劣,本文給出了一種客觀的比較標準? ? monte _ carlo模擬,結合偏移平均平方根( rootsquaremeandeviation , rmsd )和wilcoxon,將各種等值方法進行了客觀的比較分析。
  5. Tests for reprographic use ; iso - character no. 1 and no. 2

    照相復制用試樣品. iso的1和2檢驗符號
  6. If you are in doubt as to whether or not your vehicle does comply with the laws relating to construction and maintenance, you should contact the senior engineer motor vehicle examination at 34 f, immigration tower, 7 gloucester road, hong kong tel 2829 5466

    若對你的車輛是否合有關構造及保養的法例規定有所懷疑,可向香港灣仔告士打道七入境事務大樓三十四樓車輛組高級工程師查詢(電話:二八二九五四六六) 。
  7. If you are in doubt as to whether or not your vehicle does comply with the laws relating to construction and maintenance, you should contact the senior engineermotor vehicle examination at 34f, immigration tower, 7 gloucester road, hong kong ( tel 2829 5466 )

    若對你的車輛是否合有關構造及保養的法例規定有所懷疑,可向香港灣仔告士打道七入境事務大樓三十四樓車輛組高級工程師查詢(電話:二八二九五四六六) 。
  8. First, this paper introduces the notation, categories and properties of security protocols, and formal methods to verify security protocols and small system model. the emphasis is the research and analysis of the principle of the model checking method. we study the mechanism and syntax of symbolic model checking tool smv, model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    文章主要介紹了安全協議的概念、分類和性質,安全協議的形式化證方法,以及小系統模型的原理;重點分析和研究了化模型工具smv的原理和語法及其對安全協議進行模型時的工作機理,而且使用smv對needham - schroeder公鑰協議和wooandlam對稱鑰協議進行了形式化建模與模型,發現了它們的安全漏洞。
  9. We research different kinds of formal methods, particularly study the mechanism of symbolic model checking tool smv, and finally we decide to adopt smv as the tool for the model checking of security protocols. with smv, we model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    本文研究了證安全協議的各種形式化方法,詳細研究了化模型工具smv的工作機制;確定了使用smv作為工具對安全協議進行模型證了認證版needham - schroeder公鑰協議和wooandlam對稱鑰協議。
  10. We are totally surprised, after careful examination, at the low quality of the leather shoes that are sent from your side under the order confirmation no. 109

    貴公司交來我方第109購貨確認書項下的皮鞋,經仔細以後,我們不能不對其品質低劣深感驚異,該活並不合我方憑以訂購的樣品。
  11. For dsss signals, we proposed two algorithms, one is a hypothesis test algorithm that can be used to detect if there are dsss signals, the other is a symbol period estimation algorithm using the cycle - stationary feature of dsss signals

    對直序擴頻( dsss )信,本文提出了一種假設演算法測其存在性;利用dsss信的循環平穩特性,提出了估計dsss信周期的方法。
  12. Experiment results prove that this algorithm is a practical and effective method, with which the ideal cross - section curve can be acquired. the result is coincidence to the standard iri ( the international roughness index ) and meets the necessity

    結論:基於陣列信處理和小波降噪的演算法應用於路面平整度測可以得到較理想的斷面曲線,換算國際平整度指標iri與標定較吻合,合處理要求。
  13. A new sign test based on double - ranked set sampling is proposed, and its asymptotic distribution was obtained ; and the asymptotic efficiency relative to under srs and rss was discussed, which show that this test had higher efficiency

    摘要提出基於重排序集抽樣的,給出相應的極限分佈,並討論了相對于基於簡單隨機抽樣和排序集抽樣的統計量的漸近效率,得出此具有較高的功效。
  14. One of the easiest nonparametric tests to use is the sign test.

    最簡單的非參數
  15. The dissertation mainly aims at applying several active machine learning strategies to intrusion detection and systematically studies signal analysis techniques of intrusion detection based on statistical learning theory ( slt ), symbol inductive learning theory and genetic learning method. meanwhile, performance comparison and evaluation among intrusion detection techniques based on different machine learning strategies are presented according to computational learning theory and statistical hypothesis test methodology. intrusion detection is regarded as a pattern recognition problem in term of statistical learning theory ; i

    本文的主要工作是將目前幾種有生命力的機器學習策略應用於入侵測技術中,論文從入侵測的不同視角出發,系統深入地研究了統計學習理論、基於的歸納學習理論和遺傳學習方法在入侵測信分析中的應用技術,並在可能近似正確( pac )學習框架下,利用計算學習理論和統計假設方法對基於不同機器學習策略的入侵測方法進行了性能比較和評估。
  16. This research has been applied to the design of an automatic test equipment for the power electric chest in some aerial - weapon and been appraised to fulfil

    該研究成果已經應用到某型機載武器電源電子箱自動測試設備的研製中,經,滿足技術性能指標,合電子行業電源標準以及軍用電源相關標準的要求。
  17. During the modeling and verification of the authentication version of needham - schroeder public key protocol with smv, we get more comprehension on the theory of symbolic model checking and small system model, and finally find a flaw in this protocol that corresponds with the one that gavin lowe found with fdr

    通過使用smv對needham - schroeder公鑰協議進行建模和證,理解了化模型和小系統模型的原理,並發現了一個協議漏洞,該漏洞與gavinlowe用fdr所發現的相一致。
  18. In chapter 4, fault isolation based on statistical methods is discussed. firstly, the fault isolation ability of multi - block principal component analysis is tested on the tennessee eastman process. then principal component analysis and signed directed graph are combined, and the method is applied to a continuous stirred tank reactor

    第四章探討了多元統計法在故障分離中的應用:首先以田納西過程為實例分塊主元法的故障分離能力,然後把統計法故障診斷與有向圖法結合,並把這一方法應用到一個連續攪拌的化學反應釜中。
  19. Testing of materials ; continuous vibration test ; definitions, symbols, procedure, evaluation

    材料.連續振動試.定義程序評價
分享友人