正規形式 的英文怎麼說

中文拼音 [zhēngguīxíngshì]
正規形式 英文
hessenberg-form hessenberg form hessenberg
  • : 正名詞(正月) the first month of the lunar year; the first moon
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 正規 : regular; standard; normal正規部隊 regular troops; regulars; 正規教育 regular education; proper ed...
  1. By studying the shape, structure, driving - model and the rules of movement of human hand from anthropotomy, a dexterous hand close to a human hand in structure and functions with 5 fingers and 19 dofs is designed

    通過分析常人體解剖學,針對人類手掌的外結構、驅動及運動則,設計了一種5指仿人靈巧手。
  2. Very general systems of differential equations can be reduced to the normal form.

    很普通的微分方程組可以化為
  3. The principle stated above is basically the same for both regular and guerrilla war ; it differs to some degree only in its form of expression

    這個原則,戰爭和游擊戰爭是基本上同一的,只在表現上有程度的不同。
  4. There are many problems happened when international phonetic alphabet symbols are used in word - processing like nonstandard application, nonstandard encoding which cause a limitation on sharing and communication of datain teaching and research, for instance ; international phonetic alphabet and symbols contained in ones document cannot be accurately displayed when they are removed to another computer. there appears many nonstandard usage, unnecessary characters, symbols, rules, as well as some wrongly written letters which often delay publication of the papers

    不僅應用上不范,也不符合相關編碼標準,因而語言文字應用教學和研究相關數據的共享與交流等受到極大的限制。例如:某人采寫的文檔離開了作者的計算機就不能確顯示或不能顯示國際音標字母和符號。還有以先定義后使用的出現了很多不范的用例,甚至還「誕生」了一些不必要的字元和則。
  5. One weakening of normality is quasinormality.

    性的一種減弱是擬性。
  6. Returns the normalized form of the specified quaternion

    返回指定四元數的
  7. For the so-called strongly regular graphs we shall rewrite the condition in a more attractive form.

    對于所謂強的圖,我們將把條件改寫成更有吸引力的
  8. First, it was generative semanticists that started an intensive investigation of syntactic phenomena which defied formalization by means of transformational rules

    首先,是生成語義學最先開始了對于轉換則所不能化的句法現象的深入探討。
  9. Some were detached sentences ; other parts took the form of a regular diary, scrawled in an unformed childish hand

    有的是不連貫的句子,其他的是日記的,出於小孩子那種字未定的手筆,寫得亂七八糟。
  10. The thesis is divided into three parts launch the treatise, the first part of explain the inside of the hegemony theories and the regulation of the hegemony the rise and fall ; the second part put great emphasis one to analyze the formation, manifestation of the united states hegemony with the characteristic, and the comedown and innate character of the united states hegemony ; the part of the third bring upped the united states hegemony shows and under the united states hegemony the term how to handle with the problem of resolving the china - u. s

    準確的理解和把握美國霸權和霸權主義的本質,為確的處理和解決中美關系問題提供某些建議。論文分為三部分展開論述。第一部分闡述了霸權理論的內涵及霸權興衰的律;第二部分著重分析了美國霸權的成,表現和特徵,以及美國霸權的衰落及本質;第三部分提出了美國霸權的警示及在美國霸權條件下如何處理和解決中美關系的問題。
  11. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並分析了橢圓曲線密碼體制的優點及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,分析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第四,深入研究了特徵為2的有限域f _ 2m中的元素在多項基和最優基表示下的乘法運算和乘法逆運算的快速演算法,並對hankerson等人提出的多項基下的乘法運算的快速演算法作了改進,而且在實驗的基礎上不僅分析研究了f _ 2m域中元素在多項基和最優基表示下的乘法和乘法逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘法的快速演算法,同時改進了固定基點梳法,提高了整個系統的速度,並在實驗的基礎上分析研究了流行演算法的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算法庫,在我們的演算法庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  12. The safety of transmission line plays a important role in power system safety it is not only the requirement of ensure supply power reliability, but also the necessary precondition of enhance power system stabilization, to remove faulty line quickly and accurately, also keep non - faulty line continuous work when some transmission line faults current differential protection is a kind of simple, reliable and good - selective protection manner to any variety of transmission lines, power system development needs current differential protection apply to transmission lines, moreover the advancement of electric and communication technology enable current differential protection apply to transmission lines firstly, the paper discusses, analyses the research and application transmission line protection in detail, compare the principle and realistic presupposition of general line pilot protections secondly, because conventional current vector differential protection are influenced easily by load current and transitional resistance, in order to at the same time quicken protection act, the principle and criterion include work characteristic of differential protect based on fault component sampled values are studied, results shows that differential protect based on fault component sampled values excels general vector current differential protection in reliability, sensitivity and anti - saturation of current transformer in addition, synchronous current sampling methods at all terminals of line is analyzed and estimated lastly, the principle and criterion. also device design about current sampling values differential protection based on optical fiber communication, which apply to short transmission lines are concretely investigated,

    基於基爾霍夫定律的電流差動保護無論對於何種的輸電線路都是一種簡單、可靠、選擇性強的保護,電力系統的發展使得電流差動保護應用於線路保護成為需要,而電子、通信技術的發展使得電流差動保護應用於輸電線路成為可能。首先,本文對目前線路保護的研究和實際應用情況進行了討論和分析,比較了常用線路縱聯保護的實現原理和實現條件及優缺點。其次,針對常相量電流差動保護易受常負荷電流和故障過渡電阻影響的缺點,同時為加快差動保護的動作速度,對基於故障分量瞬時采樣值電流差動保護的原理、判據、動作特性等作了討論和分析,結果表明基於故障分量瞬時采樣值電流差動保護在可靠性、靈敏度、抗電流互感器飽和方面明顯優于常相量電流差動保護,對電流差動保護各端的同步采樣方法和數據通信也進行了分析和評價。
  13. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系統與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系統與神經網路構造混合型專家系統的必要性;本章還介紹了神經網路子模塊的概念,提出了混合型專家系統的一般框架與設計步驟:第三章對樣本數據進行處理,包括異常數據的剔除、因子分析等,提出了信用評價混合型專家系統的具體框架結構,介紹了系統知識庫的主要部分、基於優先級的向推理機制的流程、以及基於事實的自動解釋機制的具體實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系統進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以則類為例說明系統中具體類的實現,用偽代碼的描述了推理的演算法;第五章描述了整個系統的結構,對系統主要功能模塊和界面進行了介紹,並總結系統的特點;第六章總結了全文,指出本文所構造系統存在的不足以及對將來的展望。
  14. A powerful tool of dynamical system analysis named normal form method is presented in this dissertation, and then it was used to analyze oscillation phenomena in interconnected power grids. using nonlinear coordinate transformation of normal forms, a fully described power system can be converted to an equivalent reduced order model, which can still use the conventional modal analysis of small signal stability problems

    論文將動力系統非線性分析的理論應用於互聯系統低頻振蕩分析中,利用方法的非線性坐標變換,將高階電力系統轉化為等價的低階系統,在保留非線性信息的同時,使其仍然可以使用常小信號穩定研究的模分析方法。
  15. Characteristic normal form

    特徵正規形式
  16. 1 formal regular quality review takes place with records such as meeting minutes

    定期以正規形式檢討(復查)品質問題並做相關記錄,例如會議記錄
  17. Is it possible to provide a kind of informal preschool education to these children

    外來務工人員在城市居住多呈聚落狀態,能不能以非正規形式為這些兒童提供一定的學前教育呢?
  18. Point to in the form of other obtain employment besides standard form obtain employment, advocate if point to, working the respect such as relationship of material benefits of pay of time, income, yard ground, insurance, working is different from build what go up in foundation of industrialization and modern plant system, the floorboard of all sorts of obtain employment forms of pattern of traditional mainstream obtain employment

    指在正規形式就業之外的其他就業,主要是指在勞動時間、收入報酬、工作場地、保險福利、勞動關系等方面不同於建立在工業化和現代工廠制度基礎上的、傳統的主流就業方的各種就業的總稱。
  19. Flexible obtain employment : it is to point to in the form of other obtain employment besides standard form obtain employment, advocate if point to, working the respect such as relationship of material benefits of pay of time, income, yard ground, insurance, working is different from build what go up in foundation of industrialization and modern plant system, the floorboard of all sorts of obtain employment forms of pattern of traditional mainstream obtain employment

    靈活就業:是指在正規形式就業之外的其他就業,主要是指在勞動時間、收入報酬、工作場地、保險福利、勞動關系等方面不同於建立在工業化和現代工廠制度基礎上的、傳統的主流就業方的各種就業的總稱。
  20. These might actually reduce the size of the database since it would store only canonical forms and not variants, but this would come at the cost of external thesauri and rule - patterns for word transformations

    這種方法的確能減小數據庫大小,因為只需存儲而不必存儲變化,但詞語轉換需要消耗外部類屬詞典和變化態。
分享友人