隱式結合 的英文怎麼說

中文拼音 [yǐnshìjiē]
隱式結合 英文
implicit binding
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : 結動詞(長出果實或種子) bear (fruit); form (seed)
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • 結合 : 1 (發生密切聯系; 聯合) combine; unite; integrate; link; binding; coalition; cohesion; connectio...
  1. The structure of this paper goes like this, the first chapter introduce the development of e - b / l in practice and in laws. and draw a conclution that the electrification of the b / l is a history tide. in the second chapter, on the basic of reseach the security trap in e - b / l running, 1 conclude six security elements of, e - b / l : the liability of the system, the authenticity of dealers ' identity. the integrity and secrecy of electronic data, and the validity and evidence effectiveness of electronic data. from the third chapter to the eighth, 1 reseach these elements one by one. the third chapter introduce the establishment of the e - b / l security system, and some related laws the fourth chapter introduce the certification authority of e - b / l. in the fifth chapter, 1 introduce the encrypt of electronic information and some countries ' control on use / import / export crytography. the sixth chapter introduce the concept and principle of digital signature, and reseach some related legal issues. the seventh chapter reseach the legal demand of validity, then come to a conclution that to establish a independent electronic information system is necessary. in the eighth chapter, 1 reseach some countries " regulation on the evidence effectiveness of electronic data

    第二章在分析電子提單運作中的安全患的基礎上,歸納出其六大安全要素,即系統的可靠性、交易者身份的真實性、數據電訊的機密性和完整性、數據電訊的法有效性以及交易者行為的不可抵賴性。第三章到第八章分別對這六大要素進行分析:第三章介紹了電子提單網路安全體系的建立以及系統安全保護法規,第四章則介紹了電子提單的安全認證機構,第五章介紹了信息加密技術以及各國立法對密碼技術的進出口及使用的控制,第六章介紹了數字簽名的概念及原理,並以bolero為例介紹了數字簽名的技術方,對有關法律問題作了論述;第七章首先論述了電子提單對有效性的法律需求,然後國內法和國際規則的規定論證了數據電訊制度產生的必然性;第八章通過對各國立法對電子證據的法律效力的規定,論述了對電子交易至關重要的數據電訊的不可抵賴性。
  2. Edm has some remarkable advantages over traditional models, includes using implicit causal models, self - learning capacity, weak dependence on domain knowledge, wide applicability, robustness, self - adaptability, and population - based searching, etc. tracing back its intrinsical ideas, edm is just making use of the nature ' s decision making strategy, natural selection, to solve the decision making problems faced by human or the intelligent agents

    進化決策主要利用了進化演算法與形化計算模型相所具備的自動建模能力,它具有因果模型、自學習、弱知識依賴、應用廣泛、穩健性、自適應和群體搜索等優勢。追根溯源,進化決策的基本思想正是利用大自然的決策機制(自然選擇)來解決客觀世界所提出的決策問題,而自然進化又是已知的能力最強的問題求解范型。
  3. The step of training will pay more attention to the extrinsic curriculum and the training environment the organization mode of training combines the centralization and decentralization, in campus and out campus

    培訓措施上既注重顯性課程,更要重視培訓氛圍也即性的部分、培訓組織形上以集中與分散、校內與校外為主。
  4. Part 1 : identification of a novel gene, tsarg2, and its sequence character cloning new apoptosis - related novel gene is a key to further understanding of apoptosis mechanism and the biological process of germ cell, and it is of momentous significance on clarifying physiology and pathology process of spermatogenesis. to rapidly attain human novel gene full - length cdna sequence, the gene - specific primers and the vector - specific primers have been designed for successful performing nested pcr and draft human genome searching to rapidly identify the tsarg2 ( genebank accession number ay040204 ) 5 " end from a human testis cdna library by using a cdna fragment ( genebank accession number be644542 ) as a electronic probe, which was significantly changed in cryptorchidism and represents a novel gene. furthermore, a mouse homologue of this gene was identified ( genebank accession number af395083 ) by lab on - line

    本研究分為三個部分,其主要實驗方法及實驗果如下:第一章tsarg2基因的克隆與序列分析從已獲得的在睪和正常睪丸對照中表達量有明顯差異的est片段( be644542 )入手,設計了基因特異性引物和載體特異性引物進行巢pcr擴增,人類基因組草圖搜索法,從睪丸cdna文庫中快速分離出人類睪丸凋亡相關基因的5末端而獲得全長cdna , genbank登錄號為ay040204 ,同時應用生物信息學的方法克隆了該基因在小鼠中的同源基因, genbank登錄號為af395083 。
  5. In this paper, river water quality prediction is integrated with water pollution control measures. two parameters, water environmental capacity and pollution index are selected for pollution control measures. the objective is achieved after the development of simulation model using one - dimensional advection dispersion equation. the model algorithm and computer program is an improvement over the existing water quality models, since the model solution involves four point implicit upwind schemes for water quality prediction and pollution control measures at each grid point. model simulation results the assessment of water environmental capacity that yield the acceptable and realistic pollutants concentration in order to maintain water quality objectives. the pollution and overall pollution index of the river is suggested for integrating number of contaminants variables into one index. study provides the mathematical and scientific procedure for water quality management. the new approach is helpful for the water pollution control and to study the impacts of waste effluents on the river system for strategic planning purposes

    本文將水質預測及水污染控制措施有機地,選取水環境容量和污染指數作為水污染控制的參數.這樣,一維對流-擴散水質方程的求解除就是實現本研究目的的關鍵.本研究採用的模型在現有的水質模型基礎上有所改進,因為其採用四點對水質進行預測,推求可接納污染物的環境容量值及為保證水質而限定的污染物濃度值,從而制定相應的水污染控制措施.為整體考慮各種污染物的情況,建議採用河流的污染指數進而推求綜污染指數.總之,本研究為水質保護提供了科學的計算方法,該法對水污染控制及污水對河道水質的影響是實用有效的
  6. Abstract : in this paper, river water quality prediction is integrated with water pollution control measures. two parameters, water environmental capacity and pollution index are selected for pollution control measures. the objective is achieved after the development of simulation model using one - dimensional advection dispersion equation. the model algorithm and computer program is an improvement over the existing water quality models, since the model solution involves four point implicit upwind schemes for water quality prediction and pollution control measures at each grid point. model simulation results the assessment of water environmental capacity that yield the acceptable and realistic pollutants concentration in order to maintain water quality objectives. the pollution and overall pollution index of the river is suggested for integrating number of contaminants variables into one index. study provides the mathematical and scientific procedure for water quality management. the new approach is helpful for the water pollution control and to study the impacts of waste effluents on the river system for strategic planning purposes

    文摘:本文將水質預測及水污染控制措施有機地,選取水環境容量和污染指數作為水污染控制的參數.這樣,一維對流-擴散水質方程的求解除就是實現本研究目的的關鍵.本研究採用的模型在現有的水質模型基礎上有所改進,因為其採用四點對水質進行預測,推求可接納污染物的環境容量值及為保證水質而限定的污染物濃度值,從而制定相應的水污染控制措施.為整體考慮各種污染物的情況,建議採用河流的污染指數進而推求綜污染指數.總之,本研究為水質保護提供了科學的計算方法,該法對水污染控制及污水對河道水質的影響是實用有效的
  7. Gpus graphics processing units are used to compute virtual vertices quickly and further accelerate the computing and rendering processes. as a result, realistic effects of reflections and refractions on implicit surfaces are rendered in real time

    本文主要曲面的特點,總了方程定義曲面反射折射虛頂點的計算方法,並特別針對旋轉曲面,提出了簡單實用的虛頂點計算方法。
  8. In order to resolve the question, in the thesis a simulation arithmetic of hydro - electrical system is put up. the equations of hydro - electrical system are divided to two parts, one of which consists of the differential equations of conduit system, hydro turbine and generator ' s rotator and is solved by characteristic equation arithmetic, the other of which consists of the differential equations of generator, magnetic system and grid and is solved by longge - kuta arithmetic or covert integrated arithmetic. through the alternative solving of the two parts, the simulation results of the large - disturbance transient could be abstained eventually

    為解決這一問題,本文提出了一種將水力系統和電力系統方程交替求解的水電系統聯模擬演算法,即將包括輸水系統、水輪機以及機組轉子等部分的水力系統差分方程作為一部分,將包括同步發電機、勵磁系統以及電網等部分的電力系統微分方程或差分方程作為另一鄭州大學工學碩士論文部分,對前一部分採用特徵線法求解,對后一部分根據模型形採用龍格一庫塔法或積分法等演算法求解,這兩部分的求解過程交替進行,最終即可得到水電系統大擾動過程的模擬果。
  9. Web data mining has been combined with electronic commerce on this occasion. it is a new branch of data mining and focuses on the research in the internet on how to find out all implicit knowledge modes among all kinds of data including web logs, user register information, web page etc, and on how to gain some predictive information

    Web數據挖掘就在這樣的背景下與電子商務在一起,它是在internet出現后產生的數據挖掘一個新的分支,主要研究在internet網路上,對各種數據源,如web日誌、用戶登記信息、頁面內容等,利用數據挖掘技術尋找網路上數據間各種含的知識模和獲取一些預測性信息。
  10. Wax printing possesses rich nationality cultural connotation, the enigmatic abstract cultural signs and the geometrical patterns summarized and refined by the minorities through many generations recorded the history of their migration, worship of the totem and pursuit of good life

    蠟染具有豐富的民族文化內涵,經本民族世世代代概括、提煉形成的象徵寓意、萬種風情的抽象文化符號、點線的幾何圖案記錄著該民族悠久的遷徙歷史、對圖騰的崇拜和對美好生活的追求。
  11. Through analyzing the case of dispute happened during the reform of chengdu yjc factory, by examining its background, causes and the normality of reform, by both researching on documentations and doing on - site investigation, from the perspective of management and by focusing on the allocation of state owned properties, compensating of state employees, and management structure, this article discussed the issues and potential problems existed in the reform of state - owned enterprises of chengdu. it tried to explore ways that can improve the current methods of reform, and proposed that the exchange of property in market is the best way to reform state - owned enterprises

    論文通過對成都yjc廠改制糾紛產生的背景、原因和改制規范性的分析,採用文獻調研與實地考察相的方法,從管理學角度,著重於資產處置、職工安置和治理構等方面對當前成都市國有中小工業企業產權制度改革存在的問題和患進行論述,試圖探索改進和完善成都市國有中小企業產權制度改革的方法,並提出市場化的產權交易是國有中小企業改制,真正實現企業股權多元化,建立規范的法人治理構的最佳方
  12. And then, in the simulation of three - dimensional, the application of o - type grid and hybrid grid are used in two relatively complicated structures make the total amounts of grids and the time of grid generation reduced greatly. moreover the hexahedron grids are placed in most areas to provide higher precision. through the comparison between the results of two - dimensional and three - dimensional simulation, we knew two - dimensional calculating is not adequate

    本文用簡單、方便的二維模型作為數值計算的起點,使用耦演算法以及先進的v2f湍流模型進行求解,成功地捕捉到了激波,觀察到主氣流從壁面的分離、切換、再附壁等現象,並對計算果進行了細致的分析,得出一些有意義的論;在此基礎上,本文在國內外首次對超音速射流雙穩閥的三維流場進行了計算。
  13. Using the statistic characterization of data, the relevant knowledge reduction algorithm is put forward by combining the probability with classification rules ; using the characterization of fuzzy attributes, the decision system with subjection degree attribute is built by combing the rough set theory and fuzzy set theory, and the idea of distinguish matrix is induced to the concealed decision system to reduce data

    利用數據的統計特徵,將概率測度與分類規則起來,提出了相應的知識西北工業大學博士學位論文約減演算法;利用模糊屬性集的特點,把粗糙集與模糊集有機起來,將粗糙集中分辨矩陣的思想引入到具有隸屬度屬性的決策系統中進行數據約減。
  14. An implicit algorithm suitable for solving viscous flow problems on unstructured mixed element grids

    一種時間演算法在非構混網格粘性流動計算中的應用
  15. By analyzing the abundance distribution of the calanus sinicus at the fronts in the two surveys, we try to find the direct dominant physical processes. and on the basis of that, provide a simple coupled physical and biological model and apply it in the bohai sea. the position of the tidal fronts and vertical circulation structure near the fronts are examined using the blumberg & mellor 3d nonlinear numerical coastal circulation model incorporating with mellor & yamada level 2. 5 turbulent closure model

    論文基於目前國際上普遍使用的blumberg & melior三維非線性環流模型( ecom )並mellor & yamada的21 / 2階湍封閉模型,採用blumberg & mellor改進的半數值差分格,首先對黃海海洋鋒位置及其鋒區環流特徵、形成鋒的主要動力機制等進行了研究。
  16. A computational method is developed with couples the governing equations of the unsteady flow field and the rigid - body dynamics in six degrees - o f - freedom. 6. facing the complex multi - element and high - lift configuration, a series of methods including multi - zone algorithm and face - to - face technique is developed to lower down the great difficulties of grid generation and finish flow calculation of high - lift system with the dual - time method

    採用基於自適應直角切割網格的分區面搭接方法,雙時間推進演算法,實現了三維復雜增升裝置繞流的euler方程數值計算,發展了對存在不連續面的高陞力系統外形進行流場計算的一種方便、實用、高效的三維增升裝置繞流計算方法。
  17. The theory and the methods of study antenna were discussed in detail and combined with some conditions of the ma60 aircraft, illuminating the development plan of the shortwave antenna

    詳細地討論了天線研究理論和方法,ma60飛機的實際情況,論證了短波電臺天線的研製方案。
  18. With the introduction of two variables ? “ shareholders ’ supervision, portfolio of salary and control rights ”, we construct a new tmt “ principle ? agent ” optimizing model ; moreover, basing on mathematical analysis of company performance mechanism, a linear model of corporate performance and tmt incentive portfolio is built ; and also, variables of incentives and control rights are introduced to help parsing tmt incentive problems in the view of the shareholders ’ supervision and we succeed in separating the contribution of tmt ’ s ability to corporate performance from their endeavor. so we propose three ways to inspirit tmt ? annual salary design based on implicit value, performance - based bonus and stock ownership, and non - material incentive portfolio mode as well, which can overcome shortcomings of traditional single explicit material incentives system

    引入公司股東監督變量、薪酬與控制權激勵組變量構建新型的高級管理層激勵組委託-代理優化模型;公司績效產生機理的數學分析,構建了公司績效線性模型與高級管理層線性激勵組模型;引入股票期權激勵與公司控制權激勵變量,解析基於股東監督的高級管理層激勵問題,成功實現了公司高級管理層能力變量與努力變量對公司績效貢獻的分離解釋;提出了基於性價值的年薪設計、基於績效的獎金與股權設計、基於性需求的非物質性激勵組,克服了傳統的單一的物質性顯性激勵的局限性。
  19. According to the problem that performance functions for structures are difficult to be explicit expressed, a method based on neural network was utilized to transform the implicit function into an explicit expression

    摘要針對構可靠度分析中極限狀態方程不能明確表達的情況,神經網路技術,提出了極限狀態方程轉換為顯表達的方法。
  20. The drawback of the password is that it is easily given away. therefore there are great security threats in the access to information and resource in computer, hi an effort to confront the threats biometrics ( such as fingerprints, keystroke dynamics, and so on ) combined with the traditional verification methods may greatly increase the system security

    傳統的計算機系統登錄方為單一的口令認證,其弊端是口令易被泄露,帶來安全患,而採用人的生物特徵(如指紋和擊鍵模等)傳統認證方可增強系統的安全性。
分享友人