非控解 的英文怎麼說

中文拼音 [fēikòngjiě]
非控解 英文
nondominatedsolution
  • : Ⅰ名詞1 (錯誤) mistake; wrong; errors 2 (指非洲) short for africa 3 (姓氏) a surname Ⅱ動詞1 ...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : 解動詞(解送) send under guard
  1. Adopting rational agent characteristic could add the auditor into corporate contract to educing optimum solution ; opening out the auditor incentive factors in auditing demand theory and the monitor mechanism of auditing. a multi - agent corporate model including the firm owner, the manager and the auditor of the corporate is analyzed in the paper, the conclusions are : educing the optimum solution of model which could prevent the manager and the auditor becoming collusive or skulked ; clarifying the relationship between monitoring of the firm owner and working of the auditor, and illustrating the behavior combination of optimum solution ; further analyzing the relationship among monitoring degree, punishment of auditor and the auditor risk. adapting the model from a single term to serial terms, and adding the non - monetary utility of auditor - - - reputation into the model ; describing behavior of the firm owner in reality and clarifying the necessity of monitoring by the owner and the environment improvements it needs

    論文採用所有者經理人審計師多代理人模型為基礎進行分析,主要成果是:得出能夠防止共謀和不努力工作的模型最優集合;通過因素分析闡明審計師工作努力程度與所有者監力度之間的直接關系,以及審計合約最優的行為策略組合及其制定順序;引申分析所有者監力度與審計風險、審計師懲罰力度之間的關系;成功的將模型從單一期間擴展到多期間情況,並且將審計師聲譽等現金收入形式的效用影響加入到模型當中;通過分析審計實務中的所有者行為特徵說明所有者對審計師工作實施監的必要性,以及實現該監所需的條件。
  2. In chapter one, we ' ve briefly introduced field bus, the advanced industrial control network. contrapose to the problems exsist in field bus, we ' ve discussed the application and status of industrial ethernet in chapter two. combined with the development of ethernet, in chapter three, we ' ve brought forward a kind of ethernet structure and a design project for ethernet controller, the key equipment in ethernet. we ' ve also analysed how to resolve the uncertainty of the traditional ethernet which affected its industrial application. in chapter four we ' ve talked about how to realize network management system based on snmp and web technology, which includes its structure, function and programming model. we ' ve discussed the technology of ethernet integrating with other network in chapter five, which consisted of both integrating with information network and control network. in the last chapter we ' ve analyzed the application project of ethernet in control field through practical case

    第三章結合以太網技術的發展提出了一種以太制網路的體系結構和其中的關鍵設備? ?嵌入式以太網制器的設計方案,還對傳統以太網中影響其在工業制上應用的「確定性」問題的決辦法作了分析。第四章討論了基於snmp協議和web技術的網路管理系統的實現,包括結構、功能和編程模型。第五章討論了工業以太網和其他網路的集成技術,分為與信息網路和制網路集成兩方面,最後一章通過實例來分析以太網在制領域的應用方案。
  3. None-marxist economists define capitalism in terms of resource use and control, without reference to exploitation.

    馬克思主義經濟學家依據資源的使用和制來釋資本主義,而不是涉及到剝削。
  4. Secondly, the mixed h2 / h control is formulated as a game problem of incomplete information, a suboptimal 2x2 non - zero game model is constructed, where two channels are chose as players and h2 and h control are pure strategies, and an algorithm for mixed h2 / h control, which is based on the nash ' s bargaining theory, is derived to achieve the nash equilibrium point. finally, handling stability, ride comfort and steering handiness are related with vehicle suspension system and electrical power steering

    其次,基於對策論把h _ 2 h _混合制問題抽象為兩個對局者信息不完全情況下的零和博弈模型,在以次優范數值構造的2x2零和博弈模型中把兩類通道作為參加博弈的兩方,以h _ 2和h _制方案作為兩種純策略,基於納什談判原理設計出求h _ 2 h _混合制問題納什均衡點的演算法。
  5. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監、備份以及個人隱私等方面;一般性的安全防護措施:存取制、標識和認證、完整性制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的決方案,為其在配置、管理和應用方面提供了基本的框架。
  6. The parameter control methods are very similar to penalty function methods, both of them are to solve constrained optimization problems by solving a series of sub - unconstrained optimization problems. but parameter control methods are different from penalty function methods. firstly, the penalty coefficient of penalty function methods are preassigned, while the parameters of parameter control methodsare generated automatically according to some rule prescribed

    參數制演算法雖然與罰函數法常類似,都是通過求一系列無約束極小化問題來逼近約束優化問題的最優,但罰函數法中的罰因子是預先設定的,而參數制演算法中的參數是自動產生的。
  7. Each one provides a very fine level of control over the particulars of the session as well as an impressive toolkit for parsing the data formats into more pythonic structures

    每個模塊都提供對會話細節的常適當的級別的制,並提供用於把數據格式析為更python化的結構的令人印象深刻的工具箱。
  8. " dr. gorbsky ' s results provide elegant proof that the cell cycle must be precisely controlled, " said rodger mcever, vice president of research at the facility. " now he and his lab can work toward developing innovative methods to probe and better understand the complex process of cell division. the research is detailed in the april 13 issue of the journal nature

    該基金會負責研究工作的副主席羅傑麥凱維爾說, 「戈爾博斯基博士的研究成果為下面這種觀點提供了常有力的證據,那就是細胞分裂的循環周期必須處于精確制之下」 , 「現在他及其所在的實驗室可以致力於開發出更具創新性的研究方法,以對細胞分裂進行進一步的探索,並使人們能夠更為深入詳細地了細胞分裂的復雜過程」 。
  9. Digital image processing consume a large amount of memory and time commonly. basing on the advantage of fpga, the paper design harware module by hdl ( hardware language ), i. e., some function is achieved by les ( logic element ) of the fpga. the real - time of digital image processing is achieved by this. the sample and display of digital image is the important part. so, the paper mainly design the sample and desplay module. the sample card is designed and it ’ s word mode is configured according china ’ s cvbs ( composite video bar signal ). for acquiring the image and storing it correctly to sram, the paper design the sample - control module. the sample module can work correctly using least time. the reliability and real - time achieve the reference. according the vga principle and scheduling of the ths8134, the paper design a vga - control module by hdl. firstly, the control signal is synthesized secondly, the horirontal and vertical synchronization signals is synthesized according to the vga interface standard

    圖像處理的特點是處理的數據量大,處理常耗時,為實現數字圖像的實時處理,本文研究了在fpga上用硬體描述語言實現功能模塊的方法,通過功能模塊的硬體化,決了視頻圖像處理的速度問題。圖像數據的正確採集和顯示輸出是其中的兩個重要的模塊,因此,本文主要完成了圖像數據的採集和顯示輸出的設計。本文設計了採集卡,並要對其工作模式進行了配置和編寫了採集制模塊,在採集制模塊的制下,將數字圖像數據正確無誤的存儲到了sram中。
  10. The wing is modeled structurally by vibrational modes, which are used as amplitude of motion by a finite element analysis. conservative full - potential equation and three dimensional unsteady euler equation are used to compute the unsteady transonic flows around airfoil and wings under simple harmonic motion

    以給定機翼模態分佈下機翼上各點的模態值作為運動幅值,以三維定常全位勢方程和三維定常euler方程為制方程,求三維機翼簡諧運動下的定常氣動力。
  11. The catv charge and control system is mainly composed of the management software 、 the header data modulator and the terminal charge and control equipment. i am responsible for design catv charge and control equipment and test system. the header data modulator is used to encrypt the control single from computer and transmit it into the appointed frequency. the terminal charge and control equipment demodulate out the control single from data modulator and transmit it to the addressing control part, where the demodulated fsk single is received and well - handled by the cpu unit, decode the unauthorized signals and deliver it to the shut point, shut point make use of capability of wideband anf characteristic of shut, then the signal of illegal customer will be turn off and vice versa, the legal customer can receive the normal signal

    前端數據調制器完成對計算機輸出的制信號加密處理,將指令碼載送到一指定頻率點。終端收費制器調出制信號,送至單片機尋址制部分。單片機尋址制部分接收經fsk數據調器送來的信號,送入cpu單元后,出不授權信號,然後向關斷部分送入信號,關斷部分利用pin二極體的寬帶工作能力以及關斷特性,實現對授權用戶或者法用戶的信號關斷,使之不能正常收視,繳費用戶進行開通正常收視,達到制用戶通道的管理。
  12. With the fleet development of mobile communication industry, the security and secrecy of information has been becoming more and more vital. nowadays, the security of communication is of great importance to confirm the safety of business information. on the situation that the mobile phone has been diffusely applied, the hidden safety troubles of mobile phone should not be ignored ( such as wire tapping, imitated handset station, blue teeth connection, in exchange with electromagnetic wave, the back door of handset, lost & stolen & lost control of mobile phone, safety of non - tone increment operation of mobile phone and cell phone virus )

    據統計,目前我國gsm網路[ 1 ] [ 13 ]已覆蓋全國絕大部分地區,用戶數已超過2 . 6億,並且還在高速增長;隨著手機應用的普及,手機存在的安全隱患及面臨的威脅日益突出(如主動竊聽、假冒機站、藍牙連接、電磁波交換、手機后門、手機被盜、丟失或短時失、手機話增值業務安全以及手機病毒等) ,手機安全問題已成為當前急需決的重要問題。
  13. He sued his employer for wrongful dismissal

    告僱主僱他
  14. So the model is more integral and accurate in describing the performance of heat and mass transfer in the adsorbent bed than the traditional mathematical model. 4. pens ( perturbational exponential numerical scheme ) is adopted to ensure the successful solving of the mathematical model and the reliability of results

    採用攝動精確數值格式( pens )來求數學模型中的主要制方程,並且考慮到制方程的定常性,對原pens格式進行了定常變換,保證了數學模型計算的成功和結果的可靠性。
  15. Liupanshui beer co. ltd. has retrieved from bankruptcy to rapid development depending on technical innovation and improvement as follows : strengthening the control of saccharifying boiling intensity, the age of fermenting beer, filtration time, bottle washing of remnant alkali, sterilization intensity, and pressure prepare in nitrogen filling etc. ; making full play of employee ' s initiative and installing new equipments ; making control of filtration beginning time and keeping stable beer storage time at 0 ; settling the problem of beer species by high concentration dilution method ; applying low - pressure boiling system to increase boiling intensity, shorten boiling time, and increase beer non - biologic stability ; and making innovation of fermentation techniques to increase beer quality etc

    摘要六盤水啤酒有限責任公司依靠科技創新、走科技進步之路,通過加強對生產過程的糖化煮沸強度、發酵酒齡、開濾時間、洗瓶殘堿、殺菌強度、灌裝氮氣背壓等方面的制;發揮人的主觀能動性,實施增加硬體設施;制開濾時間,穩定制0貯酒時間;利用高濃稀釋決品種矛盾;採用低壓煮沸系統,提高煮沸強度、縮短煮沸時間,提高啤酒的生物穩定性;改進發酵工藝,提高產品質量等措施,使企業實現了發展。
  16. The second section : under the conditions of nonlinear boundary controbility, we consider the initial boundary value problem of camassa - holm equations with dissipative. by using the contractive mapping fixed point theorem and a priori estimates, the existence of global smooth s olution, global attractor in h ~ ( 2 ), t ime p eriodic s olution or almost - periodic solution and the global exponential stability are proved

    第二部分:在線性制邊界條件之下,對于帶耗散項的camassa ? holm方程的初邊值問題,用壓縮映射不動點原理及先驗估計方法,證明了整體光滑的存在性、整體的指數穩定性、 h ~ 2空間中整體吸引子的存在性以及時間周期和殆時間周期的存在性。
  17. To explain the nature of food as a medium for chemical reactions and the effects of electrolytes, non - electrolytes, ph and dispersed phases on the structures and reactivities of food components ; to examine in detail the mechanisms of non - enzymic browning, food additive - food component reactions, and methods of control

    介紹食物的化學反應、電質與質的效果、食物元素的酸堿值發散階段及組織與反應、酵素褐化的結構、食品添加物成分與反應、與制方法等。
  18. Conomic analysis model. this model has mainly four peculiarities as follows : 1. he method of large systems resolution, assemble and gradational development is used, therefore, the dimensions of the calculation program is reduced

    本模型系統主要包括了以下三個部分: 1 、支流及制區模擬模型2 、幹流模擬模型3 、經濟評價模型本模型系統主要具有以下特點: 1 、採用了大系統分、集成、分層次開發的方法,對支流和幹流模型分級開發,減小了計算模型的規模。
  19. Thirdly, this article concludes the main equation set by the means of two - control - volume, and then defines the non - solution variable quality, and finally simplifies the main equation set

    3 、用兩制容積模型建立方程,推導出主導方程組,對變量進行了確定,同時對主導方程組進行了化簡。
  20. Then, a algorithm model of non - guided weapon fire control in the state of air - ground is set up. we designed a control law of " fire / flight " coupler by use of the classical pid

    接著,建立了制導武器空地模態下火算模型,運用pid方法進行了「火/飛」藕合器的設計。
分享友人