隨息法 的英文怎麼說

中文拼音 [suí]
隨息法 英文
breath-following method
  • : Ⅰ動詞1 (跟; 跟隨) follow 2 (順從) comply with; adapt to 3 (任憑; 由著) let (sb do as he li...
  • : Ⅰ名詞1 (呼吸時進出的氣) breath 2 (消息) news 3 (利錢; 利息) interest 4 [書面語] (子女) on...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. Based on the game theory and the main theories of information economics, the relationship between the appointer and the agent in railway property operation was studies ; the relationship between the state and the ministry of railways, and between the ministry of railways and the enterprise was analyzed ; and the method of how to decide the base number under either stable and random circumstances in the commission operation of railway property was studied ; and both the agent ' s interests mechanism in property operation and how to fix the optimizing contract and the optimal strategy under random circumstances were studies also

    本文以博奕論和信經濟學中的主要結論為基礎,對鐵路資產經營中委託人和代理人之間的關系進行了研究,然後對國家與鐵道部、鐵道部與企業進行了資產經營的博奕分析;分別在穩定和機環境下對鐵路資產委託代理經營中基數的確定辦進行了研究;並對資產經營中代理人(承包人)的利益機制和機環境下最優合同與最優策略的確定進行了分析。
  2. As an effectively complemental way for traditional encryption means, with the development of information, high attention has been given to the digital watermark technology by international corporations and the academic community

    著信化建設的加快,數字水印作為傳統加密方的有效補充手段,已受到國際企業界和學術界的高度關注。
  3. Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm

    文章詳細的分析了認證系統的三種類型,即身份認證、數字簽名和消認證,剖析了一些經典的方案,並對標準安全模式與機oracle模式做出比較,並基於機oracle模式提出了一個新的身份認證演算及其相應的數字簽名變形,兩個演算均在橢圓曲線上實現。
  4. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信(例如軍事機密信、商業機密信、個人隱私信等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信被非竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  5. For the anticounterfeiting of printings ( such as certificate ), the existent many ways ( such as rainbow holograms ) are not available as the need for special use : anti - distortion and anti - copy. basing in the double - random - phase transform, this article puts forward a new way that two - dimensional bar code is used as anticounterfeiting label with anti - printing ? scanning and anti - damage properties. the major job are : ( 1 ). basing in the ascii codes, numerals and alphabets are encoded and subsequently transformed into two - value bar code matrix figure. later, using amplitude - based double - random - phase transform, the enciphered gray scale figure is formed. by computer simulation ( 4f system ) and printing as well as scanning ( 20 times ), we get the result that the gray scale figure with little miscoding rate ( 0. 0026 ) by “ matrix expanding way ”

    本文主要開展了以下三項研究工作: ( 1 ) .用自定義編碼方案,將數字和字母( ascii碼)轉換成二值條碼圖;對該圖形進行振幅型雙機相位加密變換,得到原信的加密灰度圖;通過4f光學系統計算機模擬和列印-掃描實驗,證明本文提出的「矩陣擴展」灰度圖具有較小的誤碼率,對於20次列印-掃描實驗,誤碼率不大於0 . 0026 。
  6. The article investigates shanghai list companies from 1998 year to 2002 year ' s data, and gets two models by the methods of correlation and step - wise regression. by comparing two models " s response to good and bad earnings announcement in the difference level of market, the conclusion of this article is : ( 1 ) the price response to bad and good earnings announcement is asymmetry ; ( 2 ) the price response to bad and good earnings announcement changes as the relative level of the market changes ; ( 3 ) the notion that as the market rises, the asymmetry in the response to good and bad news becomes relatively more pronounced for glamour stocks is not applied to our security market

    通過對1998年至2002年所有滬市上市公司五年的數據進行實證分析,運用相關性分析、多元逐步回歸等方,得到兩個多元回歸模型,對比兩個模型在不同市場狀態下的反應,得到了以下結論: ( 1 )市場在年報好壞盈餘信的公布情況方面反應是不對稱的; ( 2 )市場對好壞盈利信反應的不對稱性的程度主要依賴于整個市場所處的狀態; ( 3 )著市場不斷好轉,魅力股對壞盈利信的反應並沒有變得更強烈,同時對好壞盈利信的反應差別也不大。
  7. As it ' s proprietary, a large numbers of bibliography resource ca n ' t be provided to common readers of internet. along with the development of network technology, it has a instancy need to conversion marc format to the information that the browser can recognize. the language xml not only can expresses the metadata, but also can show the content of data. lt can provide individuation page layout

    Marc格式是目前圖書館館藏資源的主要表示格式,由於其專用性,使得目前大量的書目資源無通過一般的搜索引擎向internet用戶提供,著網路技術的不斷發展,迫切需要將marc格式的數據轉換成常用瀏覽器所能識別的信,為大眾提供服務,可擴展標記語言xml不僅可以表達元數據,而且可以揭示數據的內容,提供個性化的頁面顯示,用xml語言對marc數據進行描述是解決這一問題的有效途徑,文章提供了marc數據的xml表示方和實現途徑。
  8. Collisonal quantum interference ( cqi ) was observed in the intramolecular rotational energy transfer in the experiment of the static cell, and the integral interference angles were measured. to observe more precise information, the experiment in the molecular beam should be taken, from which the differential interference angle can be obtained precisely. in this paper, the theoretical model of cqi is described in an atom - diatom system in the condition of the molecular beam, based on the first - born approximation of time dependent perturbation theory, taking into accounts the anisotropic lennard - jones interaction potentials. the method of observing and measuring correctly the differential interference angle is presented. the changing tendencies of the differential interference angle with the impact parameter, velocity, and et al. are discussed

    分子內部轉動傳能的靜態池實驗觀察到了碰撞量子干涉效應( cqi ) ,並且測得積分干涉角,為了獲得更加精確的分子內部轉動傳能的碰撞量子干涉效應信,實驗就必須要採用分子束實驗進行.本文理論上採用各項異性相互作用勢,應用含時微擾理論的一級波恩近似,假想在分子束實驗的條件下,建立在原子-雙原子分子體系中碰撞量子干涉的理論模型.理論上推導出微分干涉角具體表達式,通過計算定性地討論了微分干涉角著碰撞參數、速率等的變化趨勢,同時初步探討了實驗的正確觀測途徑,得出了採用分子束進行實驗觀測的實驗方,為進一步進行分子束實驗提供了理論基礎,對實驗的進行起到了一定的借鑒作用
  9. Australia ' s reputation as a nation of laid - back, laconic types who like to take a day or two off is ill - founded. if anything we tend to work too hard

    澳洲是個以生活懶散而出名的民族, (不過)他們可以便就休一兩天說是沒有什麼根據的。如果硬要這樣說的話,那就是因為我們工作太努力了。
  10. The basic principle and method of 3d stochastic modeling of sedimentary microfacies are discussed according to geological and acoustic impedance data of well - logging constrained seismic inversion, and a case study according to stochastic modeling of fluvial facies reservoir of the minghuazhen formation of neocene in a certain block of bohai bay basin is used to show the general process of this research

    摘要探討了綜合應用地質及測井約束地震反演信進行三維沈積微相機建模的基本原理、思路與方, ?以渤海灣盆地某區塊新近系明化鎮組河流相儲層?例,說明這一研究過程的基本步驟,包括井眼沉積微相解釋、測井約束地震反演、波阻抗與地質相的概率關系分析、機模擬方選擇、地質統計特徵分析、三維機建模、機模擬預測的多解性評價。
  11. Along with arrival of the information age, the knowledge renew speeds up suddenly, the teacher as human soul engineer, as the knowledge transmisser, needs to charge unceasingly, study unceasing, renew knowledge unceasing, otherwise is unable to complete the arduous mission as " proselytizes, instructs, dispels doubt "

    著信時代的到來,知識更新急劇加快,教師作為人類靈魂的工程師,作為知識的傳遞者更需要不斷充電,不斷的學習,不斷的知識更新,否則就無完成「傳道、授業、解惑」這一艱巨使命。
  12. Along with the growth of the building industry for lease, the progress of the mechanical equipment management is not the same with it. the traditional methods - keeping business records manually, lease ( giving back ) records, calculating rent charge sum, counting rent things, ca n ' t meet the needs of the develop of business. the general headquarters of the company can only exchange information with their branches through telephone, fax or post

    著建築租賃業的發展,其機械設備管理並沒有得到同步發展,傳統的方? ?採用手工記帳、出租(歸還)登記、計算租費金額以及統計出租情況,已完全不能滿足企業業務發展的需要,加之公司總部同地處異地的分公司信交流只能通過電話、傳真或郵寄等方式進行,無及時準確地了解分公司的業務情況,有的建築設備租賃公司已開始使用設備管理軟體,但也只是剛剛起步,還存在許多問題。
  13. And then, the paper use the measure of literal similarity to classify the chinese web pages, which based on lots of experiential classifying data. then, the author uses borland delphi and visual foxpro to develop an automatic indexing system, which is used to process chinese web pages. the experiential system is composed of web pages text analysis, automatic words extracting, automatic subject indexing, classifying, indexing result confirmation and knowledge database maintenance

    后,本文利用borlanddelphi 、 visualfoxpro等工具設計並開發了一個包括中文網頁文本信提取、自動抽詞、自動主題與分類標引、標引結果處理、知識庫維護等功能,用以處理中文網頁信的自動標引實驗系統;並簡要介紹了系統的設計、工作流程、使用方及運行條件。
  14. In such problems, there are too many test cases to evaluate all the candidates, and a random sampling of test cases can be uninformative

    在這類問題中,對于所有的候選解而言,由於其數目太多而無對它們進行評估,而且機的測試事例采樣也不能提供有用的信
  15. By end of 1998, the nominal value of derivatives transactions had happened in the official exchange within 5 years increased from 7. 7 trillion u. s. dollars to 13. 5 trillion u. s. dollars, meanwhile, the nominal value of derivative securities ( otc ) increased from 8. 7 trillion u. s. dollars to 51 trillion u. s. dollars, then, the nominal value of unliquidated derivatives was total about 64 trillion u. s. dollars, and the academic field also emerged frontier science borrowing for the financial science, physics financial science, financial engineering, etc. 1973, black and scholes put forward the differential equation that any derivative securities prices based on any non - dividend paying stock must be satisfied, that is black - scholes differential equation

    Jamshidian . f在其1989年的文章中推導出零債券的期權價格。奧托同樣在其1998年的論文中用統計物理學中的路徑積分方推導出了基於零債券為基礎的期權定價模型。本文在這些學者研究成果的基礎上,進行了更深層次的研究,在vasicek機模型的基礎上,打破上述學者及著名的black - scholes期權定價模型只能求解證券及其衍生產品價格平均值的限制,對零債券和基於零債券的期權的價格求解,並推導證券瞬時價格的分佈函數。
  16. To deal with the question that how we can guarantee the dna sequences which are stored in the personal dna database are anonymous, that no one can find out whom a special dna sequence is collected from, this paper get a new method ? savior, by improve dnala ( dna lattice anonymization ), which is a method settling this question. savior replaces the multiple alignment in dnala with pairwise alignment between every tow sequences, and replaces the greedy algorithm in dnala with stochastic hill - climbing. for doing this, it can save the time for data pretreatment, and add the precision of classing

    針對個人dna數據的隱私保護問題,即:如何保證無將存儲在數據庫中的dna序列信與其提供者的個人身份信(如:姓名,身份證號碼等)聯系起來,本文對一種新近開發的隱私保護方? dnala ( dnalatticeanonymization )進行了改進,在數據預處理階段,用兩兩雙序列比對代替了原演算中的多序列比對,在不降低處理精度的情況下減少了數據預處理所耗費的時間;用機爬山代替了原演算中的貪心策略,增加了演算後期處理的精度,從而形成了一種新的演算? savior 。
  17. Insider trading is a byproduct during the process of securities exchange and generally refers to those securities dealings made by the person precribed by the law for the purpose of obtaining benefits or decreasing economic loss according to the information not yet publicized by issuers but significant enough to influence prices of securities he possesses or made others do so. it was bitterly hated and cursed from its first appearance

    證券內幕交易是著證券交易的產生而產生的,是指律規定的有關人員(內幕人員)為了獲得利益或減少損失,在其掌握的證券內幕信尚未公開前,自己或使他人對相關證券進行的或買或賣的行為。從證券內幕交易一出現,就為人們所深惡痛絕。
  18. An improved interactive dynamic multimedia synchronization model ( idsm ) based on tpn is proposed. the new model takes the dynamic synchronization properties and the demands of the priority of key medium and the function of user interaction in the distributed systems into account, introduces the allowed blocking time, backtracking rules and so on to handle the problems caused by random delay, blocking or lost packets, and describes the temporal behavior of multimedia information stream fully, accurately and formally. 4

    提出了一個新的基於tpn網的互動式多媒體動態同步模型idsm ,該模型充分考慮到分散式環境中多媒體的動態同步特性以及關鍵媒體的優先權和人機交互要求,通過引入容許阻塞時間、回溯演算等有效克服了網路機延遲、阻塞和丟包等因素的影響,以形式化的方式完整、準確地描述了多媒體信流的時間行為。
  19. Nothing contained in this section shall limit the authority of the assistant attorney general or the federal trade commission to secure at any time from any person documentary material, oral testimony, or other information under the antitrust civil process act [ 15 u. s. c. a. 1311 et seq. ], the federal trade commission act [ 15 u. s. c. a. 41 et seq. ], or any other provision of law

    本節規定不限制聯邦貿易委員會,司部長助理時依據《反托拉斯民事訴訟》 , 《聯邦貿易委員會》或其它律規定,向任何人時獲取文件性材料、口頭證據或其它信
  20. After analyzing the character of risk, i introduce data mining method into risk management, to solve the contradiction between great capacity of data and lack of information, the methods include mathematics statistics and artificial neural network ( ann ). then, i study on the methods of risk management in risk identification, risk evaluation and risk disposal, what is advanced, fault tree analysis method based on fuzzy probability, stochastic simulation method and the topsis method based on interval number all consider the characteristic of risk. finally, i discussed the application of information system ( mis ) in project risk management, and developed a risk management information system

    論文在深入分析了風險特徵之後,將數據挖掘技術引入風險管理,用以解決海量數據與貧乏信之間的矛盾,所採用的技術有數理統計和人工神經網路( ann )兩種方;接著,論文對風險識別、風險評價、風險處理中的風險管理方進行了研究,所提出的基於模糊概率的故障樹技術、機模擬技術和基於區間數的topsis方都體現了風險管理的特點;最後,論文對信系統( mis )在工程項目風險管理中的應用進行了探討,開發出一個風險管理信系統。
分享友人