隱式公式 的英文怎麼說

中文拼音 [yǐnshìgōngshì]
隱式公式 英文
implicit formula
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ形容詞1 (屬于國家或集體的) state owned; collective; public 2 (共同的;大家承認的) common; gen...
  1. In contrast to the western art, female body is confined in chinese feudal society, this is an infrangible postulate in routine as in literature

    她們的身與模糊影像,在生活一如在文學表現中,已成為不可破除之
  2. A experienced equation which is summarized by many experiments is used to determine the number of mesosphere nerve cell and a sort of new square - sum function of errors is adopted. its characteristic is that weight errors of possible exceptional point is less. accordingly, the effect of errors of possible exceptional point is reduced, which make actual function relation simulation easier

    本系統針對bp演算法的局限性,給出了一種優化的bp演算法,採用經過大量實驗總結出的經驗來確定層神經元的個數,並選取了一種新的誤差平方和函數,該函數的特點是對一些可能的異常點的誤差權值設計的較小,從而降低了異常值誤差帶來的影響,便於模擬出真實的函數關系。
  3. Namespaces implicitly have public access and this is not modifiable

    命名空間具有共訪問權,並且這是不可修改的。
  4. Currently, the army is developping military network based oa project with effort among which military email transferring system is an essential application module. this paper proposed a data model of military email transferring as well as detailed design scheme according to the potential threat in email service system, practical condition of current military network and official model as well as document transferring process. it discussed the security requirement of military email transferring system in detail as well as analyzed and design relevent data model, mail exchange protocol and application requirement of cryptogram management

    該文針對電子郵件服務系統中存在的安全患,基於對目前國內外電子郵件安全技術的分析研究,立足於現有軍事計算機網路的實際現狀,根據目前軍隊的辦文傳輸流程,提出了一種適合於軍隊辦自動化中軍用電子郵件傳輸的數據模型及具體的設計方案,詳細討論了軍用電子郵件傳輸系統的安全服務需求,對相關的數據模型、郵件交換協議、密碼管理的應用需求等進行了詳細的分析和設計。
  5. You might want to do this to keep some data hidden but still used in a formula on one of the visible worksheets

    若要藏部分數據,並確保某可見工作表中的依然可使用這些數據,就可使用此功能。
  6. Though adopting the - coordinate transformation in the control equations and mode - splitting technique, the external mode ( surface gravity waves ) is solved by the improved double - sweep - implicit finite difference method ; the internal mode ( internal gravity waves ) untilizes the eulerian - lagrangian method, which improves the implicit - difference scheme for the vertical direction. the newly developed 3d numerical tidal model with implicit scheme has been successfully applied in the radial sandbanks area

    基於過程分裂法及垂向坐標伸縮變換,外模採用改進型雙步全有限差分dsi法,內模採用歐拉?拉格朗日,改進了三維垂向,成功地建立了南黃海輻射狀沙脊群海域三維全潮流數學模型。
  7. The original flow rate formula of parobolic throat flume used for u - shaped channel is implicit function and is not convenient for calculation in irrigation districts. an simplified formula is developed in this paper, with a di fference between results calculated with the original formula and the new formul a being less than 0. 5 %

    用於u形渠道量水的拋物線形喉口量水槽原流量函數形,針對其使用不便的現狀,通過理論分析推導出了顯函數形的量水槽流量,計算結果與原流量比較相對誤差值0 . 5 % 。
  8. In this paper, it s applications were explained from seven different fields, the common zeros of two polynomials, the multiplicities of roots and the discrimination of a polynomial, searching the equations suitable for a algebraic number, implicating a rational curve over the plane, computing the zeros of a nonlinear algebraic equation and gathering the discrimination surface of the sas in automated theorem proving on inequalities

    本文從7個方面闡述了結的應用,包括判斷2個多項共零點,判定多項是否有重根,計算多項的判別,尋找代數數滿足的方程,平面有理曲線的化,非線性代數方程組求解和不等機器證明中半代數系統邊界曲面的獲得等。
  9. Supposing the company ' s value satisfies a certain probability distribution, then, we can calculate the company ' s value in the future as well as its connotative undulation basing on the relationship and a certain option pricing formula, which is based on the supposing talked above. further, we can calculate the company ' s expected default frequency. by now, the goal to measuring the company ' s credit risk has realized

    如果假設司價值波動服從某一概率分佈,那麼根據與此概率分佈相對應的期權定價,以及股票價格波動率與司資產價值波動率之間的函數關系,即可求出司未來某個時點的期望價值及其含波動率,並進一步計算出此時點司違約的概率,由此便實現了對司信用評級的目的。
  10. Mathematics method of thinking opposite to starched mathematics knowledge is fuller of vitality, mathematics knowledge is a result, but mathematics method of thinking pays attention to the formation of the result ; mathematics knowledge is recorded down with letter, sign, sketch. . etc explicit esse, but mathematics method of thinking usually tacitly exsits in the formation of concept, formula, rule, axioms and the process of problem - solving ; mathematics method of thinking is the knowledge to be placed in the higher than mathematics knowledge, if we assimilate knowledge to a key, then, mathematics knowledge opens the door of a certain realm, but mathematics method of thinking could open the door of the different realm

    相對于數學知識的呆板而言,數學思想方法更富有生命的味道,數學知識是結果,而數學思想方法關注結果的形成過程;相對于數學知識的以文字、符號、圖形等外顯的形態直接記錄下來的存在方,數學思想方法則常常以內的形存在於概念、、法則、定理的形成過程和問題解決的過程之中;數學思想方法是比數學知識處于更高層次上的知識,如果用把知識比作鑰匙,那麼,數學知識開啟的是某一領域的大門,而數學思想方法可以開啟不同領域的大門,比數學知識更富有指導意義。
  11. A new way used to decide the neuron ' s number of the hidden layer is proposed based on the analysis and on the experiential way proposed by others

    對神經網路含層的作用進行分析,在此基礎上,借鑒有關文獻提出的經驗,提出了確定含層節點數的新方法。
  12. Since conventional approaches were ineffectual, theoretical analysis and calculation were applied to find out the fault area and the reasons, and the fault was eliminated without affecting the safe operation of the unit

    由於常規的消缺辦法無法奏效,通過觀察總結出含規律,並依據理論分析和計算找出故障范圍和原因,在不影響機組安全運行的基礎上消除了缺陷。
  13. Protect worksheet contents, such as cell data, hidden formulas, and hidden rows or columns, to prevent a macro or a chart from accessing sensitive data

    保護工作表內容保護工作表中的單元格數據、藏行或列等內容,防止宏或圖表訪問敏感數據。
  14. By the preceding analysis, the author revises the pricing model, that is, the whole value of target firm is supposed to plus the net implied returns of target firm on the basis of rappaport or weston model. the mathematical formula is as follow : value of target firm = basic value + net implied returns of target firm

    通過上述分析,筆者提出修正的目標企業定價模型, gf目標企業的整體價值應在運用rappaport模型或weston模型得出基本價值的基礎上,加上目標企業含的凈收益。用數學表達如下: ? 、目標企業價值二基本價值目標企業凈收益其中:目標企業凈收益一目標企業含收益一含咸本5
  15. To unhide a hidden formula, simply unprotect the worksheet containing the formula

    要取消,只須取消包含的工作表的保護狀態即可。
  16. Hide / unhide a formula to make a formula invisible, or show a formula that has already been hidden

    藏/取消,或顯示已被藏的
  17. Field address type is actually computed, based on the value of subty, which is hidden. here is the formula

    Field address type實際上是根據subty的值計算得到的, subty是含子段,計算如下:
  18. The model utilizes set theory and matrix space conception to describe the basis of information hiding, denotes the elements of information hiding by space conception and describes the processes by space transforms primarily, and then deduces the quantitative formula of information hiding benchmarks

    該模型利用集合論和矩陣空間概念對信息藏各元素進行了空間概念表示,同時對信息藏過程進行了空間轉換描述,然後推導出了藏評價指標的定量計算
  19. According to the theory of equivalent time, creep as a function of equivalent time is expressed. by fitting experimental data, parameters of creep in equivalent time field are obtained ; initial strain implicit solution of elastic creep equation in equivalent time field is derived

    根據等效時間理論,將徐變表示為等效時間的函數,通過擬合試驗數據,得出等效時間域彈性模量和徐變度的計算參數,推導了等效時間域的彈性徐變方程的初應變解法。
  20. While jsp and el implicit objects have only one object in common

    盡管jsp和el對象中只有一個共對象(
分享友人