集的完全域 的英文怎麼說

中文拼音 [dewánquán]
集的完全域 英文
complete field of sets
  • : gatherassemblecollect
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ形容詞1 (完備; 齊全) complete 2 (整個) whole; entire; full; total Ⅱ副詞(完全; 都) entirely...
  • : 名詞(在一定疆界內的地方; 疆域) land within certain boundaries; territory; region
  1. Though the fieldbus as the communication technology of the automation field can be built as understratum network of intelligent building, but with the increase of the demand of opening, interoperability and integration of control network and information network, the lack of no unified standard, bad opening, difficulty of interoperability, lack equipment, high expense and difficulty of integration was unfolded if the system integration of intelligent building adopts fieldbus completely

    雖然現場總線作為自動化領通信技術,可以構成智能建築底層網路,但出於對網路開放性、可互操作性要求以及控制網路與信息網路成等需求,若採用現場總線進行建築智能化系統成,現場總線標準不統一、開放性差、互操作困難、設備少、費用高以及成困難等弊端便逐漸顯露出來。
  2. Silicon ( si ) is the leading material of microelectronic devices, but the nature of indirect band gap of si hinders its applications in integrated optoelectronics. to develop si - based optoelectronic integration by coupling the mature technology of si microelectronic integration with si - based light - emitting material will essentially meet the increasing demand of the great progress in the information technology

    硅是微電子器件主要材料,但硅間接能隙特性嚴重製約了其在光電子領應用,如果能在硅基材料基礎上制備發光材料,就可利用已有成熟成技術發展硅光電子成,從而有可能改變信息技術面貌。
  3. As an effective approach to processing incomplete, imprecise or uncertain information, rough set has been playing an important role in the area of data mining and knowledge discovery

    粗糙作為一種處理不、不精確及不確定信息有效方法,在數據挖掘和知識發現領大有用武之地。
  4. In this paper, we study the stopping sets, stopping distance and stopping redundancy for binary linear codes. stopping redundancy is a new concept proposed by schwartz and vardy recently for evaluating the performance of a linear code under iterative decoding over a binary erasure channel. since the exact value of stopping redundancy is difficult to obtain in general, good lower and upper bounds are important

    近年來,迭代譯碼性能分析是低密度校驗ldpc碼研究領熱點問題之一, di等人在2001年指出:迭代譯碼在二元刪除通道bec中性能可以由ldpc碼停止stopping set刻畫。
  5. The development of international modern harbor is taking new trends of deep construction, networked distribution, logistic flow business, harbor - city integrated pattern, informationalized management, nongovernmental operation, etc. harbor development of china has witnessed great progress since the establishment of prc, and the functions of harbor have extended from the initial regional business to a group of cooperated harbors

    新中國成立50多年來,我國港口取得了很大發展,港口功能由最初性貿易港發展到多港合作港口群,同時也存在規劃戰略高度不夠、大型裝箱深水碼頭不足、港口布局尚未形成網路化、相關部門物流不順暢、尚未實現港城一體化、管理信息化程度不高、民營化程度不夠等缺陷。
  6. So we should pay more attention to the eu trade policy system and go deep into the research. as a partly " super - state " regional community, eu ' s trade policy system is different from that of wto and a single state

    歐盟貿易政策體系既不同於wt0貿易政策體系,有其個體差異性;而其作為具有部分「超國家」性質貿易團,與單個國家貿易政策體系也有顯著不同之處。
  7. The main contributions of the second part of this dissertation are focused on the cryptographic properties of logical functions over finite field, with the help of the properties of trace functions, and that of p - polynomials, as well as the permutation theory over finite field : the new definition of chrestenson linear spectrum is given and the relation between the new chrestenson linear spectrum and the chrestenson cyclic spectrum is presented, followed by the inverse formula of logical function over finite field ; the distribution for linear structures of the logical functions over finite field is discussed and the complete construction of logical functions taking on all vectors as linear structures is suggested, which leads to the conception of the extended affine functions over finite field, whose cryptographic properties is similar to that of the affine functions over field gf ( 2 ) and prime field fp ; the relationship between the degeneration of logical functions and the linear structures, the degeneration of logical functions and the support of chrestenson spectrum, as well as the relation between the nonlinearity and the linear structures are discussed ; using the relation of the logical functions over finite field and the vector logical functions over its prime field, we reveal the relationship between the perfect nonlinear functions over finite field and the vector generalized bent functions over its prime field ; the existence or not of the perfect nonlinear functions with any variables over any finite fields is offered, and some methods are proposed to construct the perfect nonlinear functions by using the balanced p - polynomials over finite field

    重新定義了有限上邏輯函數chrestenson線性譜,考察了新定義chrestenson線性譜和原來chrestenson循環譜關系,並利用一組對偶基給出了有限上邏輯函數反演公式;給出了有限上隨機變量聯合分佈分解式,並利用隨機變量聯合分佈分解式對有限上邏輯函數密碼性質進行了研究;給出了有限上邏輯函數與相應素上向量邏輯函數關系,探討了它們之間密碼性質聯系,如平衡性,相關免疫性,擴散性,線性結構以及非線性度等;討論了有限上邏輯函數各類線性結構之間關系,並給出了任意點都是線性結構邏輯函數部構造,由此引出了有限「泛仿射函數」概念;考察了有限上邏輯函數退化性與線性結構關系、退化性與chrestenson譜支關系;給出了有限邏輯函數非線性度定義,利用有限上邏輯函數非線性度與相應素上向量邏輯函數非線性度關系,考察了有限上邏輯函數非線性度與線性結構關系;利用有限上邏輯函數與相信息工程大學博士學位論文應素上向量邏輯函數關系,揭示了有限廣義bent函數與相應素廣義bent函數關系,以及有限非線性函數與相應素上向量廣義bent函數之間關系;給出了任意有限上任意。
  8. The lists define polygons and can be layered on top of each other to map data sets of completely different origins while describing the same geographical area to form extremely data - rich maps

    列表定義多邊形,並可以相互層疊,來表示方向相反但描述相同地理區數據,從而形成數據詳細地圖。
  9. All algorithms that introduced hi my paper focus on the hollow hull of object, and the calculations are a series of intersection of face and line that have no ply. and by employing the topology information that come with the points since their generation, we can get the surface polygonal mesh without triangulation and reduce the time used in reconstruction of visual hulls and help to realize real - time rendering

    本文提出可見殼生成演算法都是建立在無厚度平面直線求交計算上,避免了對物體內部冗餘區計算,同時利用物體表面點與生俱來拓撲信息,恢復物體表面多邊形網格,在一定精度范圍內可以避免對散亂點進行三角剖分,減少可見殼生成時間並有助於實時繪制實現。
  10. In a partial - trust environment, a non - full trust assembly can only use transactions within the application domain in this case, the only resource being protected is system memory, unless it is granted the

    在部分信任環境中,非信任程序只能在應用程序內使用事務(在此情況下,只有所保護資源是系統內存) ,除非向它授予
  11. It is believed that the search behavior of the third instar larva of e. balteatus de geer is extensive search before feeding, and is area - concentrated search after feeding. 8. contacting with aphid, eating an aphid and contacting with agar block with aphid body fluid on it can arouse searching behavior of e. balteatus de geer larva from extensive search to area - concentrated search, and contacting with agar block can not

    8 .明確了和蚜蟲接觸、取食1頭蚜蟲及和沾有蚜蟲體液瓊脂塊接觸等食物刺激均可激發黑帶食蚜蠅幼蟲搜索行為由廣型轉換為地中型,而和瓊脂塊接觸則不能刺激其搜索行為轉換。
  12. In the case of infinite domains, it is proven that there exists a maximal solution x " of a @ x = b such that x * x for every solution x of a @ x = b if the solution set of a @ x = b is unempty and b has an irredundant completely meet - irreducible decomposition. it is also identified that there exists a maximal solution x * of a @ x = b such that x * x for every solution x of a @ x = b if the solution set of a @ x = bis unempty and every component of b is dual - compact and has an irredundant finite - decomposition. in the end, a necssary and sufficient condition that there exists a maximal solution x * of a @ x = bsuch that x * x for every solution x of a @ x = b is given when the solution set of a @ x = b is unempty

    當論為無限時,證明了如果方程a @ x = b有解且b有不可約交既分解,則對方程a @ x = b每一個解至少存在一個大於等於它極大解;進一步證明了如果方程a @ x = b有解且b每一個分量為對偶緊元並有不可約有限交分解,則對方程a @ x = b每一個解存在一個大於等於它極大解;最後給出了對方程a @ x = b每一個解存在一個大於等於它極大解一個充要條件及[ 0 , 1 ]格上方程a @ x = b中存在極大解一個充要條件。
  13. Promote the improvement of regional innovation system, gradually build industrial chains for deep processing of competitive resources and proactively boost industrial concentration and development of industrial clusters

    促進區創新體系善,逐步形成優勢資源深加工產業鏈,積極促進產業聚和產業發展。
  14. After analysis and reasoning, the author thinks it completely feasible to found global documentation center, based on the integrity of company z ' s current documentation offices and the step - by - step implementation of the integrated regional information system

    通過分析和論證,筆者認為,在z公司現有單證網點健、區球信息系統逐步推廣使用情況下,建立球單證中心設想是可行
  15. In the ongoing rapidly changing market environment, it is impossible to gain competitive advantages for enterprise and enterprise group only by scale advantage or diversification. the essence between enterprises is changing, and the activity of knowledge production, using and creation has become the key activity in the course of enterprise ' s value - added. this provides a thoroughly new framework and perspective for us to analyze enterprise and the management of group and subsidiary company

    在日益快速變化市場競爭環境下,企業和企業競爭優勢已不能憑借規模上占優勢或分散經營領而獲得,企業之間關系在發生變化,知識生產、使用和創造成為企業價值增加中關鍵活動,這就對企業和企業團母子公司管理分析帶來了一個視角。
  16. The result of experiment proves that the design and manufacture project for silicon magnetic - transistor is feasible completely, specially, in the course of manufacturing magnetic - transistor technique, anisotropic etching is applied and reliable technique project is provided in order to manufacturing silicon magnetic - transistor with rectangle - plank cubic construction, these technologies can be compatible to ic technology, integrated easily and there is a wide application field

    本文根據實驗結果,確認了該硅磁敏三極體設計、製作方案可行。尤其在硅磁敏三極體製作工藝中採用了硅各向異性腐蝕技術,為實現在矽片上製造具有矩形板狀立體結構硅磁敏三極體提供了可靠技術方案。製作工藝不但能與ic工藝相兼容,而且便於成化,將有廣泛應用領
  17. A full assembly reference includes the assembly s text name, version, culture, and public key token if the assembly has a strong name

    程序引用包括程序文本名稱、版本、區性和公鑰標記(如果程序具有強名稱) 。
  18. Recently, the intelligent pattern design system based on artificial intelligence and image processing has been developed rapidly. however, the current system is not capable of collaborative work between designers neither can they meet the requirement of information exchange and group design

    然而,僅僅依靠目前圖案設計輔助軟體不能滿足浙江省輕紡行業區行業信息共享和體創新需要,因為目前輕紡圖案設計系統雖然大多能夠支持單個設計者獨立設計和人機交互,但還無法很好地支持設計者之間協同工作。
  19. Adding an assembly to the skip verification list creates a security vulnerability. a malicious assembly could use the fully specified assembly name assembly name, version, culture, and public key token of the assembly added to the skip verification list to fake its identity

    如果將某程序添加到跳過驗證列表中,則惡意程序可以通過使用該程序限定程序名稱來隱藏身份,限定程序名稱由程序名稱、版本、區性和公鑰標記組成。
  20. Intelligent decision support handbook of applications and advance of the rough sets theory, slowinski r ed., kluwer academic publishers, 1991, pp. 331 - 362

    從映射角度考慮,由於它們定義屬性序合和值reduct相同,因此,它們是相同映射。
分享友人