identity function 中文意思是什麼

identity function 解釋
恆等函數, "是"函數
  • identity : n. 1. 同一,一致;同一性。2. 本體;正身;個性。3. 【邏輯學】同一性。4. 【數學】恆等(式)。
  • function : n 1 功能,官能,機能,作用。2 〈常 pl 〉職務,職責。3 慶祝儀式;(盛大的)集會,宴會。4 【數學】...
  1. It will provide us to further study the function of xanthophyll cycle in photoprotection. the major results are as following : two cdna sequences encoding violaxanthin de - epoxidase were cloned from japonica rice ( jrvde ) and indica rice ( irvde ) with the full - length of 1887bp and 1647bp, respectively. the homology of the open reading frame is 98 % identity between two rvde genes, and more than 60 % identities with those of other species

    本論文從水稻和菠菜中克隆了編碼vde酶的基因,並通過轉基因植物進一步研究了葉黃素循環在熱耗散方面的作用,主要獲得了以下結果:首次從兩個水稻亞種(秈稻和粳稻)中克隆了rvde基因(分別命名為irvde和jrvde )的全長cdna序列,分別長1647bp和1887bp ,兩者開放閱讀框的同源性為98 ,與其它已知vde基因的同源性在60以上。
  2. We provide the structure and function of system software and hardware, discuss image attaining, division employee serial number from chest card image, then combine multiple characteristic and coding to recognize employee serial numbe, employee identity, and register check on work attendance

    文中給出基於胸卡識別的?勤系統的體系結構和功能,並詳細論述了圖像捕捉、胸卡和編號的分割、以及採用多特徵抽取和編碼器結合對編號進行識別的方法,進行職工身份識別,達到?勤的目的。
  3. The function and value of corporate identity and its impact on employees

    價值取向的公眾觀及其對員工的激勵作用
  4. This article tinselly explains the connotation of commercial bank " s system, describes marxian and the new system economics, puts forwards the definition essential function and target of the commercial bank " s system on the theory of the system and its vicissitude ; secondly, summarizes of historic analysis puts forwards the features of both system and theory for the three period in the historic vicissitude, and the instructive node of vicesitudesystem of the theory of it synthetic bank system " s vicissitude with the force of market and nation ; thirdly, illustrates the identity and difference of the commercial bank " s system through the horizontal analysis for its system ; finally, according to china " s reality, analyses the processes of the chinese commercial bank " s system, the synthetic tendency of the vicissitude of realistic bank " s system and the reason for synthesis, puts forwards it synthetic mode of the chinese commercial bank ' s system and the specific request and content of the creation of commercial bank " s system, providing the reference for the reform of the chinese commercial bank " s system

    其次,用歷史的分析方法對商業銀行制度進行了總結,論述了商業銀行制度歷史變遷中三個階段的制度特徵及理論特徵,提出了由市場力量和國家力量共同主導下的綜合銀行制度變遷的理論特徵及引導性制度變遷模式。再次對商業銀行制度做了橫向的比較分析,論述了商業銀行制度的趨同性和差異性。最後根據中國的實際情況,分析了中國商業銀行制度的歷史變遷過程和現實銀行制度變遷的綜合化趨向及動因,提出了中國商業銀行制度綜合化的模式及商業銀行制度的具體要求和內容,為中國的商業銀行制度改革提供參考。
  5. There are large amount of " be proved with poem " phenomenon in ancient chinese novels, and there are five reasons about it : the poetery ' s lofty position and special identity ; the authors ' experience and knowledge ; the artistic function of the poetry ; the cultural tradition of realistic ; and the main consumption subject - readers

    摘要中國古代小說中普遍存在「有詩為證」現象的原因有五:與詩的崇高地位、特殊身份有關,與小說作者本身的經歷、學養有關,與詩自身的藝術功能有關,與貴真求實的文化傳統有關,與消費主體讀者有關。
  6. Dna fragments containing rst - 0x1 and rst - 0x2 as well as their promoters were abtained by pcr. the results of sequencing and blast analysis suggested these fragments shares 99 % identity with sinorhizobium meliloti 1021. function of rst - oxl was unknown, while rst - 0x2 shares 81 % identity with gshb gene of rhizobium tropici, which encoding glutathione synthetase

    序列測定和blast分析表明,它們和苜蓿中華根瘤菌1021的相應基因有99同源性, 042bm的rst - 0x1基因功能未知,而rst - 0x2基因和熱帶根瘤菌谷胱甘肽合成酶基因gshb有81同源性。
  7. No matter which kind of statements, all mean it is limited with the government ' s function that " the country help the administrative center of the loan " ( hereafter referred to as " centre " ) appearing in identity of functional department, but as a student loan management with very obvious economic characteristic, its operation follows economic law, its space - time has no one that restrains, it is in other words limitless

    無論哪種說法,都意味著以政府的職能部門身份出現的「國家助貸款管理中心」 (以下簡稱「中心」 )的職能是有限的,但是作為一項經濟特徵十分明顯的學生貸款管理工作,它的運行是遵循經濟規律的,它的時空是沒有約束的,換句話說是無限的。
  8. This article starts from the discussion on the two aspects of class development level and class cohesion level, and therefore constructs a class appraisal criterion system to measure the educational function of classes in higher education on the basis of the following five aspects : common targets, class identity, organizational core, communication with others and self management

    本文主要從班集體發展水平和班集體凝聚力水平兩大方面進行探討,建立了以共同目標、集體認同、組織核心、人際交往、自我管理五個指標為基礎的高校班集體教育功能的量化評價指標體系。
  9. This algorithm does not need to choose non - linear function artificially, but automatically estimates score function according to the statistic identity of signals

    本演算法無需選擇非線性函數,而是根據信號的統計特性自動地直接估計評價函數。
  10. The fipwa based on electric integral equation ( efie ) is presented firstly, the green ’ s function expansion with sommerfeld identity ( based on bessel kernel ) is studied and the msdp for two cases is formulated. in order to improve the iteration property and avoid inner resonance, the combined field integral equation ( cfie ) fipwa is then constructed successfully

    首先研究了基於電場積分方程的快速非均勻平面波演算法,對索末菲恆等式(基於貝塞爾積分核)展開的格林函數進行了深入研究,分兩種情形解決了修正最陡下降路徑的設計問題。
  11. First, it introduces the network control center of beidou satellite and the beidou satellite locating navigational system, which are the background of design and implementation of web service, and the function and status of web service in system. then, it totally analysis the identity and structure of web service, and expound several technologies of web service : the first is xml which is the base technology, the second is wsdl which is the interface description language of service, the third is soap which is communication and message transferring of service, the fourth is uddi which is the description, discovery and integration of service

    首先,對webservice的設計實現所在的系統背景? ?北斗衛星定位導航定位通信系統和民用網管中心進行簡要介紹,以及webservice在系統內的作用和地位;然後從總體上分析了webservice特性、體系結構,並闡述了幾種webservice的相關技術:第一,核心技術xml ;第二, web服務描述語言wsdl ;第三,服務組件的通訊和消息傳遞協議soap ;第四,服務組件的描述、發現和集成協議uddi 。
  12. Virtual community and real community corresponding really but speech, in fictitious " projection " of space realistic space, such characteristics as the loose, interpersonal and interdynamic equality of the symbol nature with exceeding space - time, member ' s identity of human communication of fictitious community, interpersonal relationships, etc. ; to investigate from the sociology meaning, it has new characteristics in such respects as community members ' interdynamic, function and flow, management of the community of structure, community ' s colony of the community, etc. therefore, it needs to arouse the attention from society

    摘要虛擬社區是與傳統的實在社區相對應而言的,是現實空間在虛擬空間的「投影」 ,具有人際交往的超時空性、成員身份的符號性、人際關系的鬆散性、人際互動的平等性等特徵;從社會學意義上去考察,它在社區成員的互動、社區的功能與結構、社區群體的流動、社區的管理等方面具有新的特點,需要引起社會的關注。
  13. On a group of identity of sine and cosine function

    餘弦函數的一組恆等式
  14. Its function in normalizing cultural behavior, modeling cultural personality and adjusting cultural life may restrain criminal act ; the folk - culture may be used to reveal the suspect ' s identity character, range of terrain, criminal motive, and the tricks of anti - detection in detecting crime

    民俗文化規?文化行為、模塑文化人格、調節文化生活的功能可以遏制犯罪行為;民俗文化中的語言民俗、社會民俗、心理民俗等可以啟動犯罪行為;在犯罪偵查中,利用民俗文化可以揭示涉案人的身份特徵、查清涉案人的地域?圍、分析涉案人的作案動機、辨析涉案人的反偵查伎倆。
  15. Intrusion detection system is an active security technology developed in the recent decade, which integrates detection, audit, alert and response function. as an important part in information security mechanism, it supplies a gap for access control and identity authentication, thus becoming a main study area. in this thesis, the various intrusion detection models and detection methods are firstly categorized and studied, merits and defaults of which are discussed in detail, then the intrusion response system and intrusion traceback are studied

    本論文對現有的各種入侵檢測模型和技術進行了系統歸類和分析研究,詳細討論了各檢測分析技術的優點和存在的不足;對入侵響應系統和入侵追蹤技術進行了初步的研究;在研究基於靜態自治代理和移動代理的入侵檢測基礎上,設計了一種基於多代理的分散式入侵檢測與響應系統模型( multi - agent - basedintrusiondetectionresponsesystem , maidrs ) 。
  16. It comes up with a new notion, d - solution, which is applied to the distance estimation, by virtue of hilbert space ; furthermore, the dissertation has gained a necessary condition which is identity of minimum mean - square value in linear function classes, so that d - solution extends minimum mean - square value within the domain of nonlinear function equation or equation system ; and, the dissertation studies in detail the classical moment estimation and maximal likelihood estimation on the parameters of ar ( p ), a series of theorems in the estimation section shows the moment estimators are consistent on the ground of large samples jikewise, those distribution functions of the estimated parameters accord to maximum likelihood estimation converge gauss distribution if the white noise is gaussan

    首先,藉助hilbert空間理論,提出了距離估計的d -解,給出了d -解的必要條件,這個條件在線性函數類里即是極小二乘估計法, d -解的必要條件滿足的方程實質上將極小二乘估計法推廣到多函數及非線性函數類。再而,詳細地研究了多元弱平穩序列自回歸模型ar ( p )的參數經典的矩的替代估計和極大似然估計,獲得矩的替代估計的一致性的結果。對基於gauss白噪聲假設多元弱平穩序列自回歸模型的均值、白噪聲的協方差陣的極大似然估計都有依分佈收斂到多元正態分佈的統計性質。
  17. The most used technique is the encryption decipher technology, others include the identity authentication, firewall technology, router security, intrusion detection, emergency responds and restores technical, the honeypot technology and so on. while these technologies is under development, some of them is only single function, mutually independent, and difficult for the system administration. they cannot be trusted completely as the solutions to network intrusion behavior which emerges one after another increasly in the reality

    目前,解決網路安全問題的主要技術手段有加密解密技術、身份認證、防火墻技術、安全路由器、入侵檢測、應急響應與恢復技術、蜜罐技術等,這些技術在發展的同時,也存在著功能單一,相互獨立,難于系統管理的不足,不能應對現實中層出不窮的網路入侵行為,所以單純依靠這些技術不可能滿足全部的安全要求。
  18. Finally, we analyzed the security of this system completely which can be used to provide service involving confidentiality, integrality, certificate - based identity authentication and digital signature, etc. this system is consisted of two sub - systems : center of certificate mangement and client based military email transferring component, proposing two methods namely " two - level encryption " and " certification carrying " to ensure the confidentiality of system as well as identity authentication and key distribution with offline method. it uses hash function to allow the integrality of the email transfer and digital signature technology to allow the no - denying of email tranfer, which forms a complete military email transferring system

    該系統包括證書管理中心和用戶端軍用電子郵件傳輸組件兩個子系統,提出了「兩級加密」和「證書攜帶」兩種方式,以確保系統的機密性及離線方式下的身份認證、密鑰分發,利用雜湊函數實現郵件傳輸的完整性,採用數字簽名技術實現了郵件傳輸的不可否認性,形成了一個完整的軍用電子郵件傳輸系統。
  19. The identity function is a good solution for a surrogate key function in most cases

    Identity函數在大多數情況下是代理鍵函數的一個好的解決方案。
  20. It is more flexible than the identity function, because it is a separate object in your database

    該函數比identity函數更靈活,因為它是數據庫中的一個獨立對象。
分享友人