符號檢驗法 的英文怎麼說

中文拼音 [háojiǎnyàn]
符號檢驗法 英文
sign test
  • : Ⅰ名詞1 (符節) tally (with two halves made of wood bamboo jade metal issued by a ruler to gener...
  • : 號Ⅰ名1 (名稱) name 2 (別號; 字) assumed name; alternative name3 (商店) business house 4 (...
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 動詞1. (察看; 查考) examine; check; test 2. (產生預期的效果) prove effective; produce the expected result
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  • 符號 : 1 (記號; 標記) character; sign; symbol; mark; code; notation; expression; denotation; sentinel ...
  • 檢驗 : checkout; test; examine; inspect; verify; survey; check;checking;testing;[英國]jerque(指檢查船舶...
  1. One is the evt - based var model ( including gev model and gpd model ), the other is the quantile regression var model. secondly, i evaluate predictive performance of a selection of var models for chinese stock market data. these var models include riskmetrics method, historical simulation, monte carlo method, and the three recent models based on quantile regression and extreme value theory

    本文首先重點探討了極值分佈var模型(包括廣義極值分佈和廣義帕雷托分佈兩個模型)和分位數回歸var模型;然後在此基礎上將六個var模型(包括上述三種模型、歷史模擬、 riskmetrics方以及蒙特卡洛)實證應用於估計上證指數、上證180 、深證成指、深證綜指95 var和99 var ;同時採用區間預測、損失函數符號檢驗法對這些var模型進行了選擇評估。
  2. Second, the procedure of estimating test equating coefficients may be dull or complex, in this thesis, a uniform procedure, which not only improve the computing efficiency, but also is the base of comparison of various equating methods, is given. third, because the comparison of equating methods is a major part on test equating research, there is not a reliable criterion up to now, in order to compare the new methods with the existing ones, in this thesis an objective approach is given. the new a pproach consists of three steps : 1

    最後,由於等值方優劣的比較是等值研究的重要內容,但迄今為止沒有一個合理的比較標準,為了比較新導出的等值方和原有等值方之間的優劣,本文給出了一種客觀的比較標準? ? monte _ carlo模擬,結合偏移平均平方根( rootsquaremeandeviation , rmsd )和wilcoxon,將各種等值方進行了客觀的比較分析。
  3. If you are in doubt as to whether or not your vehicle does comply with the laws relating to construction and maintenance, you should contact the senior engineer motor vehicle examination at 34 f, immigration tower, 7 gloucester road, hong kong tel 2829 5466

    若對你的車輛是否合有關構造及保養的例規定有所懷疑,可向香港灣仔告士打道七入境事務大樓三十四樓車輛組高級工程師查詢(電話:二八二九五四六六) 。
  4. If you are in doubt as to whether or not your vehicle does comply with the laws relating to construction and maintenance, you should contact the senior engineermotor vehicle examination at 34f, immigration tower, 7 gloucester road, hong kong ( tel 2829 5466 )

    若對你的車輛是否合有關構造及保養的例規定有所懷疑,可向香港灣仔告士打道七入境事務大樓三十四樓車輛組高級工程師查詢(電話:二八二九五四六六) 。
  5. First, this paper introduces the notation, categories and properties of security protocols, and formal methods to verify security protocols and small system model. the emphasis is the research and analysis of the principle of the model checking method. we study the mechanism and syntax of symbolic model checking tool smv, model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    文章主要介紹了安全協議的概念、分類和性質,安全協議的形式化證方,以及小系統模型的原理;重點分析和研究了化模型工具smv的原理和語及其對安全協議進行模型時的工作機理,而且使用smv對needham - schroeder公鑰協議和wooandlam對稱鑰協議進行了形式化建模與模型,發現了它們的安全漏洞。
  6. We research different kinds of formal methods, particularly study the mechanism of symbolic model checking tool smv, and finally we decide to adopt smv as the tool for the model checking of security protocols. with smv, we model check the authentication version of needham - schroeder public key protocol and woo and lam ij symmetric key protocol

    本文研究了證安全協議的各種形式化方,詳細研究了化模型工具smv的工作機制;確定了使用smv作為工具對安全協議進行模型證了認證版needham - schroeder公鑰協議和wooandlam對稱鑰協議。
  7. For dsss signals, we proposed two algorithms, one is a hypothesis test algorithm that can be used to detect if there are dsss signals, the other is a symbol period estimation algorithm using the cycle - stationary feature of dsss signals

    對直序擴頻( dsss )信,本文提出了一種假設演算測其存在性;利用dsss信的循環平穩特性,提出了估計dsss信周期的方
  8. Experiment results prove that this algorithm is a practical and effective method, with which the ideal cross - section curve can be acquired. the result is coincidence to the standard iri ( the international roughness index ) and meets the necessity

    結論:基於陣列信處理和小波降噪的演算應用於路面平整度測可以得到較理想的斷面曲線,換算國際平整度指標iri與標定較吻合,合處理要求。
  9. The dissertation mainly aims at applying several active machine learning strategies to intrusion detection and systematically studies signal analysis techniques of intrusion detection based on statistical learning theory ( slt ), symbol inductive learning theory and genetic learning method. meanwhile, performance comparison and evaluation among intrusion detection techniques based on different machine learning strategies are presented according to computational learning theory and statistical hypothesis test methodology. intrusion detection is regarded as a pattern recognition problem in term of statistical learning theory ; i

    本文的主要工作是將目前幾種有生命力的機器學習策略應用於入侵測技術中,論文從入侵測的不同視角出發,系統深入地研究了統計學習理論、基於的歸納學習理論和遺傳學習方在入侵測信分析中的應用技術,並在可能近似正確( pac )學習框架下,利用計算學習理論和統計假設對基於不同機器學習策略的入侵測方進行了性能比較和評估。
  10. In chapter 4, fault isolation based on statistical methods is discussed. firstly, the fault isolation ability of multi - block principal component analysis is tested on the tennessee eastman process. then principal component analysis and signed directed graph are combined, and the method is applied to a continuous stirred tank reactor

    第四章探討了多元統計在故障分離中的應用:首先以田納西過程為實例分塊主元的故障分離能力,然後把統計故障診斷與有向圖結合,並把這一方應用到一個連續攪拌的化學反應釜中。
分享友人