逆序列 的英文怎麼說

中文拼音 [liè]
逆序列 英文
opposite sequence
  • : Ⅰ形容詞1 (方向相反) contrary; counter 2 [數學] inverse; converse Ⅱ動詞1 (抵觸; 不順從) go aga...
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  1. ( 2 ) it explains the basic concept of time series, some kinds of the common time series models and the development characteristics of time series in detail. it analyses how to judge the model from the self - related function and the deviation related function. determining a better standard to set up models from the comparison of some kinds of fixed step time series standards, then predicts utilizing the counter function

    ( 2 )詳細闡明了時間的基本思想、幾種常見的時間模型以及時間的動態特徵,分析了如何利用自相關函數和偏相關函數來對模型進行判定,通過對時間的幾種定階準則的比較,確定一種好的定階準則來建立模型,從而可以利用函數法進行預報。
  2. This sequence emergences fourteen times from 1000 ests library indicts that it is a middle affluently gene in cdna library. the cdna of 634 basepairs contains an open reading frame of 339 nucleotides encoding a novel nonspecific lipid transfer protein. the first 23 amino acids constitute the putative signal peptide, characteristic for targeting to the secretory pathway

    測得th - nsltp全長為634bp ,含有一個非特異性脂轉移蛋白與植物耐性的相關性研究編碼112個氨基酸的閱讀框架, n端的23個氨基酸組成一段信號肽,表明它可能和分泌有關。
  3. We can find a polynomial model of a time series in case its associated matrix is not diagonal and not of full rank by using the transformations of the exponential and the logarithm

    對于不能對角和不滿秩的時間矩陣,運用指數對數的可變換及相關的變換化為滿秩可對角的時間矩陣,從而找到代數多項式模型。
  4. In the receive site, we operate non - chaos synchronization in reverse and resume binary message sequence by the correlated rule of the sender

    接收端根據發送端的相關規則,進行非混沌同步的運算,恢復出二進制信息
  5. This is the reason why reversing the index when its leading column is fed by a sequence reduces buffer contention, removes the hot block problem and by doing so, reduces the potential for buffer busy waits on a multi - user system

    這正是為何當前導( /起始)生成時索引的處理可以降低緩存爭用,解決熱塊問題,並且這樣做可以在一個多用戶系統中減少緩存忙等待的機會。
  6. Based on the usage and maintenance - support process, this thesis acquires knowledge with the esd and cesd ( converse event sequence diagram ) method. first, this thesis gives the concept of cesd

    為此,在事件圖(正向esd )框架基礎上,提出向事件圖(向esd )的模擬方法,以與正向esd相結合,用以滿足決策知識獲取的要求。
  7. It reverses the order of the lines or fields in a list of files

    )該命令對所出的文件中的各行或各段進行
  8. Why would a reverse index be useful when the leading column of the index is generated from a sequence

    當索引第一產生,一個索引有什麼用?
  9. In fact, if you code a. net client to talk to this web service, the. net client fails to de - serialize the websphere response, as in

    事實上,如果您編寫一個. net客戶來與這個web服務交互, . net客戶將不能夠正確地逆序列
  10. Approach, which passes through the literal documents and relies on the xml schema to validate and de - serialize the xml representation of objects, the

    通過文本文檔來傳遞信息並基於xml腳本來校驗和逆序列化對象的xml表示。不同於
  11. Style in which developers have to assume everything, including the serialization and de - serialization of the xml - based soap messages

    方式相反,在那種方式下,程員不得不處理所有的事務,包括基於xml的soap消息的化和逆序列化。
  12. In the synchronous " model, based on the idea of polygonal flux linkage locus, by means of constructing the switch state period table of three phrase voltage inverter is required. in the brushless model, the igbt ( isolated gate bipolar transistor ) switch state period table is gained by gal ( generic array logic ) which analyzes the signal of position feed - back

    在同步方式下,基於多邊形磁鏈軌跡法的思想,用作圖法求得三相電壓型變器的pwm波形;在無刷直流方式下,用gal對位置反饋信號進行邏輯綜合,得到開關管的導通規律。
  13. In the end, i discussed the formation and evolution character of long sequence cycles, which had close relation to asynchronous thrust action of longmen mountains and micang - daba mountains

    詳細討論了短期、中期和長期旋迴層的結構類型、沉積、疊加樣式和分佈模式,最後探討了長期旋迴層的形成、演化特徵以及與龍門山和米倉山?大巴山兩構造帶非同步沖推覆作用的關系。
  14. Firstly, the paper models the multivariable discrete state - space model of the air transmission unit by the lab method, using multi - dimensional inverse m series as input stimulus signal

    首先利用多維m作為激勵輸入信號,用實驗法建立出空氣傳送部分的多變量離散狀態空間模型。
  15. By means of plant genetic engineering, foreign insects resistance gene can be transferred into plant cell. we cloned the cpti gene and transferred it into mustard by agrobacterium - mtdi & ted transformation method. and obtained the transgenic mustard plants. the main results are as follows : 1. isolation of cpti gene total rna was isolated from cowpea seedss cotyledons and leaves. the cpti gene fragment was amplified by rt - pcr using sequences of its two sides as primers

    本實驗是利用植物基因工程獲得抗蟲的轉基因芥菜植株,結果如下: 1豇豆胰蛋白酶抑制劑基因的分離分別提取豇豆種子、子葉及葉片的總rna ,轉錄成cdna 。以豇豆胰蛋白酶抑制劑基因兩端的為引物,用rt - pcr的熱啟動方法從上述cdna中擴增出目的基因片斷。
  16. An improved ar model is studied, which established by the combination normal order time serial and contrary order data in case the observations are less, and then, the combination model with improved grey and time serial is introduced. it can reflect not only the deformation tendency, but also the stochastic characters. it is very suitable to be applied to deformation analysis and prediction

    為了充分利用有限的地表變形數據所蘊涵的內在規律性,提出了利用變形數據的正時間建立ar模型的方法,並與時變灰色模型組合,不但可反應出變形數據的趨勢性,同時還可表現出其隨機性,從而可進一步提高預測的精度和效果。
  17. The author mainly realized the method of generating the large random numbers and judging the prime number using lehmann means, then three pairs of secure key with different lengths ( 256 bits, 512 bits, 1024 bits ) was generated to meet the demand of different security grade. in encryption module, modular multiplication arithmetic of large number was realized adopting addition chaining. in decryption module, extended euclid was used to get inverse, and the chinese remainder theorem was used to realize decryption, which increased the speed of decryption greatly

    作者主要實現了大隨機數的生成、採用整除小素數和勒曼測試法判定素數,可以生成三種不同長度的密鑰對( 256位、 512位、 1024位)來滿足不同的加密安全等級的需求;加密模塊中,選用了二進制的乘法方法,實現了大數模冪乘運算;解密模塊中,引用了擴展的歐幾里德法求元,並採用中國剩餘定理實現解密過程,大大提高了解密速度。
  18. Then based on it an audio encryption algorithm is proposed by adopting module operation, which has nice encryption characters in the simulation. another audio encryption algorithm based on zero dynamical nonlinear invertible system is studied and improved. in order to compare the encrypiton characters between the improved and the original algorithm, their applications to audio encryption are simulated, and the corresponding results are shown in chapter 3

    本文的主要成果有:提出了一種混沌實值的生成方法,並在此基礎上引入模變換對語音信號進行加密,經實驗模擬可以得到良好的加密效果;對零動態可混沌語音加密通用模型的一個具體加密演算法進行了改進,並通過模擬實驗比較了改進前後演算法的加密性能。
  19. Gene duplication is one of the most important factors that influence the evolution of genome size, the origination of novel gene, the genetic robustness against null mutations, the speciation, etc

    摘要基因重復是基因通過不等交換、轉錄轉座或全基因組重復等途徑產生一個與原基因相似的基因或堿基
  20. Among sequenced 16 positive clones randomly selected, two represent novel expression tag sequences, two are homologous to two unknown proteins in genbank ; the rest are homologous to known or putative proteins or enzymes with definite functions by searching the genbank through blast program, which are involved in various life activities of cell such as regulation of gene expression, plant secondary metabolism, signal transduction, adversity resistance, stress response and defense reaction. significant changes of quantities of these gene fragments were observed before and after ssh, which indicated they were enriched after ssh

    隨機挑選了16個差異表達的克隆進行測定,經與genbank數據庫相關數據比較分析,發現有2個新的cdna片段( ets ) ,有12與genbank中已知蛋白或推測蛋白質( putativeprotein )有高低不同的同源性,它們參與基因的表達調控、植物的次生代謝、信號傳導、抗、應激及防禦反應等細胞生命活動過程。
分享友人