集的完全域 的英文怎麼說
中文拼音 [jídewánquányù]
集的完全域
英文
complete field of sets-
Though the fieldbus as the communication technology of the automation field can be built as understratum network of intelligent building, but with the increase of the demand of opening, interoperability and integration of control network and information network, the lack of no unified standard, bad opening, difficulty of interoperability, lack equipment, high expense and difficulty of integration was unfolded if the system integration of intelligent building adopts fieldbus completely
雖然現場總線作為自動化領域的通信技術,可以構成智能建築的底層網路,但出於對網路開放性、可互操作性的要求以及控制網路與信息網路集成等需求,若完全採用現場總線進行建築智能化系統集成,現場總線的標準不統一、開放性差、互操作困難、設備少、費用高以及集成困難等弊端便逐漸顯露出來。Silicon ( si ) is the leading material of microelectronic devices, but the nature of indirect band gap of si hinders its applications in integrated optoelectronics. to develop si - based optoelectronic integration by coupling the mature technology of si microelectronic integration with si - based light - emitting material will essentially meet the increasing demand of the great progress in the information technology
硅是微電子器件的主要材料,但硅的間接能隙特性嚴重製約了其在光電子領域的應用,如果能在硅基材料的基礎上制備發光材料,就可利用已有成熟的硅集成技術發展硅光電子集成,從而有可能完全改變信息技術的面貌。As an effective approach to processing incomplete, imprecise or uncertain information, rough set has been playing an important role in the area of data mining and knowledge discovery
粗糙集作為一種處理不完全、不精確及不確定信息的有效方法,在數據挖掘和知識發現領域大有用武之地。In this paper, we study the stopping sets, stopping distance and stopping redundancy for binary linear codes. stopping redundancy is a new concept proposed by schwartz and vardy recently for evaluating the performance of a linear code under iterative decoding over a binary erasure channel. since the exact value of stopping redundancy is difficult to obtain in general, good lower and upper bounds are important
近年來,迭代譯碼的性能分析是低密度校驗ldpc碼研究領域的熱點問題之一, di等人在2001年指出:迭代譯碼在二元刪除通道bec中的性能可以由ldpc碼的停止集stopping set完全刻畫。The development of international modern harbor is taking new trends of deep construction, networked distribution, logistic flow business, harbor - city integrated pattern, informationalized management, nongovernmental operation, etc. harbor development of china has witnessed great progress since the establishment of prc, and the functions of harbor have extended from the initial regional business to a group of cooperated harbors
新中國成立50多年來,我國港口取得了很大發展,港口的功能由最初的地域性貿易港發展到多港合作的港口群,同時也存在規劃戰略高度不夠、大型集裝箱深水碼頭不足、港口布局尚未形成網路化、相關部門物流不順暢、尚未完全實現港城一體化、管理信息化程度不高、民營化程度不夠等缺陷。So we should pay more attention to the eu trade policy system and go deep into the research. as a partly " super - state " regional community, eu ' s trade policy system is different from that of wto and a single state
歐盟貿易政策體系既不完全同於wt0的貿易政策體系,有其個體差異性;而其作為具有部分「超國家」性質的區域貿易集團,與單個國家的貿易政策體系也有顯著的不同之處。The main contributions of the second part of this dissertation are focused on the cryptographic properties of logical functions over finite field, with the help of the properties of trace functions, and that of p - polynomials, as well as the permutation theory over finite field : the new definition of chrestenson linear spectrum is given and the relation between the new chrestenson linear spectrum and the chrestenson cyclic spectrum is presented, followed by the inverse formula of logical function over finite field ; the distribution for linear structures of the logical functions over finite field is discussed and the complete construction of logical functions taking on all vectors as linear structures is suggested, which leads to the conception of the extended affine functions over finite field, whose cryptographic properties is similar to that of the affine functions over field gf ( 2 ) and prime field fp ; the relationship between the degeneration of logical functions and the linear structures, the degeneration of logical functions and the support of chrestenson spectrum, as well as the relation between the nonlinearity and the linear structures are discussed ; using the relation of the logical functions over finite field and the vector logical functions over its prime field, we reveal the relationship between the perfect nonlinear functions over finite field and the vector generalized bent functions over its prime field ; the existence or not of the perfect nonlinear functions with any variables over any finite fields is offered, and some methods are proposed to construct the perfect nonlinear functions by using the balanced p - polynomials over finite field
重新定義了有限域上邏輯函數的chrestenson線性譜,考察了新定義的chrestenson線性譜和原來的chrestenson循環譜的關系,並利用一組對偶基給出了有限域上邏輯函數的反演公式;給出了有限域上隨機變量聯合分佈的分解式,並利用隨機變量聯合分佈的分解式對有限域上邏輯函數的密碼性質進行了研究;給出了有限域上邏輯函數與相應素域上向量邏輯函數的關系,探討了它們之間密碼性質的聯系,如平衡性,相關免疫性,擴散性,線性結構以及非線性度等;討論了有限域上邏輯函數各類線性結構之間的關系,並給出了任意點都是線性結構的邏輯函數的全部構造,由此引出了有限域上的「泛仿射函數」的概念;考察了有限域上邏輯函數的退化性與線性結構的關系、退化性與chrestenson譜支集的關系;給出了有限域邏輯函數非線性度的定義,利用有限域上邏輯函數的非線性度與相應素域上向量邏輯函數非線性度的關系,考察了有限域上邏輯函數的非線性度與線性結構的關系;利用有限域上邏輯函數與相信息工程大學博士學位論文應素域上向量邏輯函數的關系,揭示了有限域上的廣義bent函數與相應素域上的廣義bent函數的關系,以及有限域上的完全非線性函數與相應素域上向量廣義bent函數之間的關系;給出了任意有限域上任意。The lists define polygons and can be layered on top of each other to map data sets of completely different origins while describing the same geographical area to form extremely data - rich maps
列表定義多邊形,並可以相互層疊,來表示方向完全相反但描述相同地理區域的數據集,從而形成數據詳細的地圖。All algorithms that introduced hi my paper focus on the hollow hull of object, and the calculations are a series of intersection of face and line that have no ply. and by employing the topology information that come with the points since their generation, we can get the surface polygonal mesh without triangulation and reduce the time used in reconstruction of visual hulls and help to realize real - time rendering
本文提出可見殼的生成演算法都是建立在無厚度的平面直線求交計算上,完全避免了對物體內部的冗餘區域的計算,同時利用物體表面點集與生俱來拓撲信息,恢復物體表面的多邊形網格,在一定精度范圍內可以避免對散亂點集進行三角剖分,減少可見殼的生成時間並有助於實時繪制的實現。In a partial - trust environment, a non - full trust assembly can only use transactions within the application domain in this case, the only resource being protected is system memory, unless it is granted the
在部分信任的環境中,非完全信任程序集只能在應用程序域內使用事務(在此情況下,只有所保護的資源是系統內存) ,除非向它授予It is believed that the search behavior of the third instar larva of e. balteatus de geer is extensive search before feeding, and is area - concentrated search after feeding. 8. contacting with aphid, eating an aphid and contacting with agar block with aphid body fluid on it can arouse searching behavior of e. balteatus de geer larva from extensive search to area - concentrated search, and contacting with agar block can not
8 .明確了和蚜蟲接觸、完全取食1頭蚜蟲及和沾有蚜蟲體液的瓊脂塊接觸等食物刺激均可激發黑帶食蚜蠅幼蟲搜索行為由廣域型轉換為地域集中型,而和瓊脂塊接觸則不能刺激其搜索行為轉換。In the case of infinite domains, it is proven that there exists a maximal solution x " of a @ x = b such that x * x for every solution x of a @ x = b if the solution set of a @ x = b is unempty and b has an irredundant completely meet - irreducible decomposition. it is also identified that there exists a maximal solution x * of a @ x = b such that x * x for every solution x of a @ x = b if the solution set of a @ x = bis unempty and every component of b is dual - compact and has an irredundant finite - decomposition. in the end, a necssary and sufficient condition that there exists a maximal solution x * of a @ x = bsuch that x * x for every solution x of a @ x = b is given when the solution set of a @ x = b is unempty
當論域為無限集時,證明了如果方程a @ x = b有解且b有不可約完全交既分解,則對方程a @ x = b的每一個解至少存在一個大於等於它的極大解;進一步證明了如果方程a @ x = b有解且b的每一個分量為對偶緊元並有不可約有限交分解,則對方程a @ x = b的每一個解存在一個大於等於它的極大解;最後給出了對方程a @ x = b的每一個解存在一個大於等於它的極大解的一個充要條件及[ 0 , 1 ]格上方程a @ x = b的解集中存在極大解的一個充要條件。Promote the improvement of regional innovation system, gradually build industrial chains for deep processing of competitive resources and proactively boost industrial concentration and development of industrial clusters
促進區域創新體系的健全和完善,逐步形成優勢資源深加工的產業鏈,積極促進產業集聚和產業集群的發展。After analysis and reasoning, the author thinks it completely feasible to found global documentation center, based on the integrity of company z ' s current documentation offices and the step - by - step implementation of the integrated regional information system
通過分析和論證,筆者認為,在z公司現有單證網點健全、區域性集成全球信息系統逐步推廣使用的情況下,建立全球單證中心的設想是完全可行的。In the ongoing rapidly changing market environment, it is impossible to gain competitive advantages for enterprise and enterprise group only by scale advantage or diversification. the essence between enterprises is changing, and the activity of knowledge production, using and creation has become the key activity in the course of enterprise ' s value - added. this provides a thoroughly new framework and perspective for us to analyze enterprise and the management of group and subsidiary company
在日益快速變化的市場競爭環境下,企業和企業集團的競爭優勢已不能完全憑借規模上占優勢或分散經營領域而獲得,企業之間的關系在發生變化,知識的生產、使用和創造成為企業價值增加中的關鍵活動,這就對企業和企業集團母子公司管理的分析帶來了一個全新的視角。The result of experiment proves that the design and manufacture project for silicon magnetic - transistor is feasible completely, specially, in the course of manufacturing magnetic - transistor technique, anisotropic etching is applied and reliable technique project is provided in order to manufacturing silicon magnetic - transistor with rectangle - plank cubic construction, these technologies can be compatible to ic technology, integrated easily and there is a wide application field
本文根據實驗結果,確認了該硅磁敏三極體設計、製作方案完全可行。尤其在硅磁敏三極體的製作工藝中採用了硅各向異性腐蝕技術,為實現在矽片上製造具有矩形板狀立體結構的硅磁敏三極體提供了可靠的技術方案。製作工藝不但能與ic工藝相兼容,而且便於集成化,將有廣泛的應用領域。A full assembly reference includes the assembly s text name, version, culture, and public key token if the assembly has a strong name
完全的程序集引用包括程序集的文本名稱、版本、區域性和公鑰標記(如果程序集具有強名稱) 。Recently, the intelligent pattern design system based on artificial intelligence and image processing has been developed rapidly. however, the current system is not capable of collaborative work between designers neither can they meet the requirement of information exchange and group design
然而,僅僅依靠目前的圖案設計輔助軟體不能完全滿足浙江省輕紡行業區域的行業信息共享和集體創新的需要,因為目前的輕紡圖案設計系統雖然大多能夠支持單個設計者的獨立設計和人機交互,但還無法很好地支持設計者之間的協同工作。Adding an assembly to the skip verification list creates a security vulnerability. a malicious assembly could use the fully specified assembly name assembly name, version, culture, and public key token of the assembly added to the skip verification list to fake its identity
如果將某程序集添加到跳過驗證列表中,則惡意的程序集可以通過使用該程序集的完全限定程序集名稱來隱藏身份,完全限定程序集名稱由程序集名稱、版本、區域性和公鑰標記組成。Intelligent decision support handbook of applications and advance of the rough sets theory, slowinski r ed., kluwer academic publishers, 1991, pp. 331 - 362
從映射的角度考慮,由於它們的定義域屬性序集合和值域reduct集合完全相同,因此,它們是完全相同的映射。分享友人