統計規則性 的英文怎麼說

中文拼音 [tǒngguīxìng]
統計規則性 英文
statistical regularity
  • : Ⅰ名詞1 (事物間連續的關系) interconnected system 2 (衣服等的筒狀部分) any tube shaped part of ...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • : Ⅰ名詞1 (性格) nature; character; disposition 2 (性能; 性質) property; quality 3 (性別) sex ...
  • 統計 : 1 (對有關數據的搜集、整理、計算和分析) statistics; census; numerical statement; vital statistic...
  • 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
  1. For this purpos, from the point of the log geology, aimed at the actuality of the current fractured reservoir log geology interpretation and evaluation, based on synthetical analysis of the current domestic and foreign fruit of fractal dimension investigation of reservoir fracture, using the method and technique of fractal dimension, through the further discussion of the fractal dimension characteristics of m index and n index in the log interpretation archie model in a sample way and through the theoretic reasoning to the fractal dimension dfa and m index of fractured reservoir interval ' s log curve, according to the geophysical signification of the fractal dimension dfa of fractured reservoir interval ' s log curve shape : the more complicated the change of the curve shape is, the larger the its dfa value is, then the more complicated space structure of fracture and pore, then the higher value of m index of space structure of fracture and pore, and so on, the text propounds an improved method, based on box dimension, of covering log curve with scale grid, and by programming computes the dfa and its m index value of fractured reservoir interval ' s log curve, for instance, ac and rt curve, ect, then further puts this technique into application investigation, and makes analysis of application effects in the reservoirs located in l area of qx oil field from three aspects : 1. the dfa and its m index value of fractured reservoir interval ' s log curve, for instance, ac and rt curve, ect, which are derived from computing, is used to identify reservoir type by crossplotting m index with the product df _ acrt of fractal dimension of acoustical wave log curve and restivity log curve and by experiential discriminance plate of reservoir type in l area of qx oil field

    因此,對該區裂縫儲集層的類型識別、孔滲特徵的測井地質解釋以及儲層裂縫的發育和分佈律進行深入的研究便成為本文研究的出發點。為此,本文從測井地質的角度,針對當前裂縫儲層測井地質解釋與評價的現狀,在綜合分析當前國內外儲層裂縫的分形分維研究成果的基礎上,利用分形分維方法和技術,通過對archie測井解釋模型中的m指數、 n指數的分形分維特的深入淺出的論述以及裂縫儲層段測井曲線分維d _ ( fa )與m指數的理論推導,根據裂縫儲層測井曲線形態分維值的地球物理意義? ?曲線變化越復雜,其分維值d _ ( fa )越大、裂縫孔隙空間結構越復雜、裂縫孔隙空間結構指數m值越高等特徵,提出了改進的基於盒維數的測井曲線網格覆蓋法,編程算了裂縫儲層段常測井曲線(如聲波和電阻率曲線)上分形分維值及其m指數值,進而從以下三個方面對qx油田l區塊的裂縫油藏進行應用研究,效果十分理想: 1將算得到的可變的m指數與聲波和電阻率分維之積df _ acrt進行交繪,採用儲層分維值分類技術分析這些參數變化的律,並結合qx油田l區塊儲層類型經驗判別圖版,從而實現qx油田l區塊下白堊的裂縫儲層的類型識別。
  2. In order to maintain the rules conveniently, we make use of the technology of rdbms in managing data, consider the trait of production rules, and then design and realize the arithmetic to check the rules " equipollence and circulation on the basis of our former work - knowledge ordering. all these solve the knowledge base ' s consistency effectively

    為了方便對的維護,我們充分利用數據庫管理系對數據管理的巨大威力,結合產生式知識的特點,在原有知識序化的基礎上,對的等價、循環做了演算法設與實現,較好地解決了知識庫的一致問題。
  3. It is very important to ensure the reliability, comparability, relevance, understandability and timeliness of accounting information so as to bring into play its social functions. on the other hand, the accounting information rules which the accountants produced and supplied must be exotic, applicable and consistent in order to assure its quality. accounting system is just the intermedium which supplied the common accounting information systematically, roundly, concretely, understandably and operationally

    保證會信息的可靠、可比、相關、可理解和及時,對于發揮會信息的社會功能至關重要;另一方面,為了保證會信息質量,會人員生產和提供會信息的必須是公開、適用、一致的,而系、全面、具體、易理解、易操作地提供這些共同會信息的媒介,就是會制度。
  4. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設了基於數據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設和實現了一個高能的網路數據採集系和網路數據預處理的方案;然後,在對關聯挖掘和序列挖掘演算法進行研究的基礎上,結合網路數據的特和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路數據的關聯模式和序列模式;最後,研究了描述模式的應用,並設出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  5. This paper illustrates the impersonal inevitability and possibility to set up the second - board market of our country by contrastive researches on its procreant reason, background and overseas primary operational patterns, and designs instauration pattern and market regulations of the second - board market of our country by the numbers

    本文通過二板市場產生的原因、背景及國外主要二板市場運作模式的對比研究,闡明我國開設二板市場的客觀必然和可能。並系地對我國二板市場的設立模式及市場進行了總體設研究,主要內容有以下幾方面: 1
  6. Similarily, according to the dsp data access pattern and design philosophy of md32, a data memory combined data cache and data rani is proposed. in the md32 rtos, memory management system is one the most important part

    同時,針對dsp中數據訪問的特點和md32同時兼顧dsp與risc特的設特點,設了包含數據ram和數據cache的數據存儲系,並對給出了數據存儲系的訪問
  7. A dynamic hierarchical description method for workflow is presented. the method provides a dynamic hierarchical way to define a workflow with non - determinate or dynamic factors. with this method, the main process defined at build - time can be reified and extended by the principle of the sub - organizations at either the build - time or the run - time. to ensure the consistency and integrity of the description, a series of constraint rules are also discussed to realize seamless integration between a decomposed process and its original one. this approach supports the description of unpredictable uncertainties, the dynamic hierarchy of business process, and the dynamic modification of enterprise organizations, and all of these improve the flexibility and extendability of workflow management systems dramatically

    為支持流程中不確定因素和動態因素的描述,提出了柔工作流的動態層次描述方法,使得流程設人員在流程定義階段定義的主流程可以在任意時刻由子組織的負責人進行細化和擴充.為保證動態層次描述的正確和完整,討論了動態層次描述的一系列約束,確保分解后的流程與原有流程實現無縫銜接.該描述方法支持對不可預知的非確定因素的描述,支持業務流程的動態層次描述以及組織機構的變化,極大地增加了工作流管理系的柔和可擴展
  8. And it can be also applied to kb, idss, real - time database and expert systems etc. on the other hand, the organization and inference of the rules in the present kb has no unified symbol, which makes structure complicated, design difficult, reasoning more complex and accurate because of unconformable outer condition and event

    另一方面,在現行知識庫中對于的組織、調度與推理並無一標志。這種無,造成在設知識庫時,由於外部條件、事件的不可確定,使得庫內結構復雜,增加了設的困難,也增加了推理的復雜度和準確
  9. This article canvass the status quo of the archive ' s automatization administration and the develop status of data mining, and discusses how to combine the data mining technology with the archive work from data cleaning means, data mining arithmetic, and data storage etc. and this article put forword a data mining syst em design idea. this article ' s structure is : first, in allusion to the archive data status quo, the pretreatment work of archive data that include data quality evaluation, data cleaning and data commut - ation process is bringed forword ; second, in the process of realizating data mining, the article discusses conception description, association rule, class three familiar means of applicating data mining, also put inforword the concrete arithmetic and the program design chart, and discusses the range and the foreground of all kinds of arithmetic when they are applicated in the archive ; third, the base of so you say, this article also discusses the importance of the archice applicate data storage and the means of realizing it ; last, the article discusses seval important problem of realizing an archive data mining system from data, diversity, arithmetic multiformity, mining result variety and the data pretreatment visibility, mining object descriptive visibility, mining process visibility, mining result visibil ity, user demand description and problem defining etc aspect. the article ' s core is how to import data mining technology in the archive work

    本文評述了檔案自動化管理現狀和數據挖掘技術的發展狀況,從數據清洗方法、數據挖掘演算法、數據倉庫的建立等方面論述了如何將數據挖掘技術與檔案工作相結合的具體思路,並提出了一個數據挖掘系的設思想。文章首先,針對檔案數據的現狀,提出了應對檔案數據進行預處理工作,包括數據質量評估、數據清理、數據變換和歸約等過程;其次,在具體實現數據挖掘過程中,本文結合檔案數據的特點探討了概念描述、關聯、分類等三種常見挖掘形式的實現方法,提出了具體的實現演算法和程序設框圖,並論述了各種演算法在檔案工作中的應用范圍及前景;第三,在上述基礎上,又論述數據倉庫在檔案數據挖掘中的重要並提出了實現一個檔案數據倉庫的方法;最後,從處理數據的多樣、演算法的多樣、挖掘結果的多樣、數據預處理可視化、挖掘對象描述的可視化、挖掘過程可視化、結果顯示可視化、用戶需求的描述及問題定義等幾方面討論了實現一個檔案數據挖掘系的幾個重點問題。全文以探討如何將數據挖掘技術引入到具體的檔案工作實踐中為核心。
  10. The article also describles two technical prombles about the general design of the system. the mis for aton is a modernized information management system, different from the computer systems that are used for calculation and control

    本文對系中的關于數據庫設中的數據組織和航標要素屬代碼編寫這兩個技術環節進行了詳細的說明。
  11. An idea, simulating the fuzzy model by establishing the fuzzy model and fuzzy control rule of the controlled object is proposed. generally, it is difficult to acquire the accurate mathematical description of the controlled object. a dynamic modulating factor is introduced in the designing of the fuzzy controller so as to improve the precision of the fuzzy control. and a more convenient defuzzify calculation method is adopted. the cart and the single inverted pendulum are taken so as to illustrate the simulation result. in addition, the detailed qualitative analysis of the fuzzy system is achieved. a kind of common method of qualitative analysis is proposed. it can be used to analyse the fuzzy system and describe the behavior of the system state precisely in the phase plane. the simulating results illustrated the method is feasible and available

    提出了在難以精確描述控制對象數學模型的情況下,通過建立控制對象的模糊模型來確定系的模糊控制,並對模糊系進行模擬分析的思想.利用連續系分析的思想,提出一種對模糊系進行定分析的可行方法,在相平面內較為準確地刻畫模糊系的動態行為.在模糊控制器的設中,引入動態調節因子來提高模糊控制的精度,並採用了一種便於實際運算操作的解模糊運算方法.在一種簡單的控制對象情況下進行了具體的模擬算,得到較理想的控制效果.此外對具有精確數學模型的一級倒立擺系進行此種模糊控制,亦取得很好的模擬結果
  12. A large quantity of simulation data indicates that, the toggle rules found by this genetical algorithm have good avalanche effects and diffusibility

    通過大量的實驗數據表明這類演化具有良好的雪崩、擴散
  13. At present, the most of vtr which are used in watch - control occasion for speciality are short of a uniform control - check - alarm system, which brings on the discommodiousness of operation and the user can not know the time of occurring a fault, which reduces the reliability of the watch - control system. therefor, at first, i carefully analyze the servo theory of the vtr which had been produced by chmavc with k mechanism to find out the work rule of the control signal ; second, take out some right control signal ; then for dealing with the problem of vtr in use for watch - control, i choose some right components to design the uniform control system for many special vtr with protel software. it mainly includes the following functions : operation functions of all vtr ( for example : power, play, ff, rew, stop, rec, eject, fwd, rwd, sp, lp ) was controlled by line at the same time ; in, the process of recording, when the tape walks to the end or stops by itself, the system gives an alarm and shows the number of the wrong vtr ; in the process of recording, the system gives an alarm and shows the number of the wrong vtr when the video signal from vidicon is losed ; the system controls all vtr to record on the non - working time when there is something wrong in the guarding section ; the system controls the video from vtr to switch to right monitor

    目前,用在監控場合的業務用錄像機普遍缺乏一個一的控制及檢測報警系,這就導致了操作的不方便和出現了故障用戶不知道,降低了監控系的可靠,為此,我首先對華錄松下生產的k機芯的錄像機伺服原理進行仔細分析,找出各個伺服控制信號的控制變化律;然後從中選出合適的控制信號;針對目前錄像機在實際監控使用過程中存在的問題,選用合適的元器件;運用protel繪圖軟體,設了這個多臺業務用錄像機的一控制系,她主要包括以下功能:錄像機操作功能(如power play ff rew stop rec eject及正尋反尋帶速設定等)的一線控控制功能;磁帶在記錄過程中,磁帶到頭和磁帶自己「偷停」的報警,並要能顯示出具體是哪一臺錄像機;在記錄狀態下,攝像頭輸入信號丟失報警,並要能顯示出具體是哪一臺錄像機;在休息或其他不需要記錄時,一旦警戒區有情況,控制所有機器自動進入錄像狀態的功能;從錄像機輸出的監控圖像信號對監視器的切換功能。
  14. The communication system ' s performance is briefly analyzed by channel capacity, which is a function of bit error rate ( ber ). the decision rule is based on the most likelihood method. for reproducing the original binary signals more correctly, time scale transformation method and the approach of ensemble average probability of error bits are introduced

    通過理論分析和模擬實驗,本文研究了這個非線數字通信系能,給出了誤碼率和通道容量公式,提出了系參數調節方法,採用最大似然法設了適合這個系輸出的判決
  15. The content of this paper is arranged as foll owing : chapter 1 introduces the concept of credit, credit risk and credit assessment, as well as the history and development of credit assessment ; chapter 2 introduces the history of ai technology, and the background of expert system and neural network. characters and disadvantages of expert system and neural network are presented respectively and the necessity of combining expert system and neural network is lightened ; chapter 3 shows the process of dealing with sample data, including the treatment of exceptional data and factor analysis, and puts forward the concrete framework of the mixed - expert credit assessment system ; chapter 4 introduces concept of object - oriented technology, and constructs object model and functional model after analyzing the whole system. it also illustrates the implementation of concrete classes by an example of rule class and the inference algorithm in the form of pseudocode ; chapter 5 introduces the structure of the whole system, the major functional models and their interfaces, and the characteristic of the system is also generalized ; chapter 6 summarizes the whole work, and points out the remaining deficiencies as well as the prospective of this method

    本文具體內容安排如下:第一章介紹了信用、信用風險、信用評價的概念,回顧了信用評價的歷史、發展和現狀,並綜合各種信用評價模型,指出這些模型各自的優缺點:第二章簡單描述了人工智慧技術,著重介紹有關專家系與神經網路的基礎知識,通過總結它們的優缺點,指出結合專家系與神經網路構造混合型專家系的必要;本章還介紹了神經網路子模塊的概念,提出了混合型專家系的一般框架與設步驟:第三章對樣本數據進行處理,包括異常數據的剔除、因子分析等,提出了信用評價混合型專家系的具體框架結構,介紹了系知識庫的主要部分、基於優先級的正向推理機制的流程、以及基於事實的自動解釋機制的具體實現方法;第四章介紹了面向對象技術,進而採用面向對象對信用評價系進行分析,建立了對象模型和功能模型,並在此基礎上,採用c + +語言以類為例說明系中具體類的實現,用偽代碼的形式描述了推理的演算法;第五章描述了整個系的結構,對系主要功能模塊和界面進行了介紹,並總結系的特點;第六章總結了全文,指出本文所構造系存在的不足以及對將來的展望。
  16. Based on many references, a evaluating function is proposed with performance index of hall call waiting time ( hwt ), people number in a car, energy consuming. the statistic approximation algorithm for hwt is introduced, based on the analysis of elevator traffic state, the calculation of traveling distance and stop number is explained in detail in the thesis. according to the characteristics of the elevator, a group of elevator teaching signals are constructed, by which the weight coefficients are trained according to the widrow - hoff rule

    本文在借鑒了大量的文獻基礎上,提出以平均等候時間、轎廂人數、能源消耗為能指標的評價函數;詳細介紹了乘客待梯時間hwt的近似演算法;基於對電梯交通狀況的分析,對停層次數和運行距離這兩個重要參數的算進行了詳盡的介紹;依據電梯運行特參數,構造一組電梯運行教師信號,並採用神經網路的widrow - hoff學習訓練權系數。
  17. Jxta systems can be designed to be interoperable - but there are no hard - and - fast rules that they must be interoperable in any useful manner

    Jxta系可以設成具有互操作的但沒有硬說它們必須以任何有用的形式具備互操作
  18. Tank containers must be filled to at least 80 %, to avoid dangerous surging - swell during transport. tank containers generally must not be filled to more than 95 % to allow for possible heat expansion. tank equipped for top or bottom discharge

    本文設的iso1cc黃磷罐式集裝箱即根據集裝箱的原條件及imdg定的危險品運輸進行設,並針對黃磷的物進行了安全實用的結構設和裝、卸操作系
  19. In chapter 1, the western audit theories on risk factors about fraudulent behaviors, the " gone " theory and the iceberg structure theory are introduced and analyzed ; further, the achievements of the researches on the fraudulent behaviors by the american independent audit scholars and professionals are systematically discussed, including the development process of the usa ’ s researches on the fraudulent audit, the researches on the process of the usa ’ s audit standards setting, the researches on the sticking point analysis of these behaviors in the usa ’ s stock market and so on. the above introductions and analyses are made in order to explore the rule of the fraudulent behaviors, the environments and the characteristics of the behaviors in the western capital markets, especially the recently important accounting fraud cases in the usa ’ s

    在第一章「國外審界對舞弊行為的理論研究」中,介紹並分析了西方審理論界揭示舞弊行為的舞弊風險因素理論、 「 gone 」理論、冰山結構理論;系說明了美國獨立審界對舞弊行為的研究成果,包括美國獨立審界對舞弊行為研究的發展過程、美國舞弊審的制度變遷狀況及美國證券市場中舞弊行為的癥結分析;探索了西方資本市場中舞弊行為的、環境線索和舞弊行為特徵,並對美國近期發生的重大會舞弊案件進行了剖析。
  20. The main focus of this paper is to design a general - purposed embedded video digital signal processor. aimed at the general - purposed nature to different kinds of algorithms of this system, network architecture of parallel - processing multi - processors is studied, and the bottleneck problem of the system common bus is solved, thus establishing a detailed project of the system. to achieve the stability of the system, the signal integrity problem in the printed circuit board ( pcb ) is studied as its theoretical background, and the design rules of the high - speed circuit pcb are summarized, which have been applied in actual systems, and thus achieving good effects

    本文設了一套通用的嵌入式視頻數字信號處理器:針對系對多種演算法通用要求研究了多處理器的并行處理網路結構,解決了該系的總線瓶頸問題,並確定了系的詳細設方案;針對系對穩定要求,在理論上研究了印刷電路板中的信號完整問題,總結了高速電路印刷電路板的設,並在實際系中獲得了應用,取得了很好的效果。
分享友人