散化規則 的英文怎麼說
中文拼音 [sǎnhuàguīzé]
散化規則
英文
bulk chemical code- 散 : 散動詞1. (由聚集而分離) break up; disperse 2. (散布) distribute; disseminate; give out 3. (排除) dispel; let out
- 規 : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
- 則 : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
- 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
-
Yellow - green or yellow chlorosis or brown necrosis in basal areas of older and expanding leaves ; margins curled downwards and leaf expansion irregular and suppressed ; chlorosis and necrosis spreading into interveinal areas of older leaves ; youngest leaves distorted, necrotic and failing to expand ; petioles truncated ; death of stem growing point
西葫蘆缺硼:老葉和正展開葉的基部黃綠色或黃化或變褐壞死,邊緣向下捲曲和葉片展開不規則和抑制,色斑和壞死斑散布在老葉葉脈間,心葉扭歪、壞死、無法展開,莖生長點枯死This paper reviews adopted fiscal, political and administrative measures of decentralization in empirical studies and proposes using delphi technique to measure decentralization in local planning decision - making
本研究總結了從財政、政治和管理方面對分散化進行評價的經驗研究和研究過程,介紹了如何應用德爾菲法則來評價土地利用規劃的地方決策過程。A large quantity of simulation data indicates that, the toggle rules found by this genetical algorithm have good avalanche effects and diffusibility
通過大量的實驗統計數據表明這類演化規則具有良好的雪崩性、擴散性。On theory, based on the latest research of the international neuro - physiologist and psychologist on no, we detail several important results highlighting the role of source structure in the diffusion process, such as point source, hollow sphere source and irregular structure. second, we have had a advanced research on self - organizing feature maps. and some qualities of sofm have been analyzed
理論地,在國際神經生理學、心理學與醫學關于內源性一氧化氮( no )最新研究的基礎上,深入分析一氧化氮的非局部擴散遞質和逆轉錄信使的特性,同時針對模型的不同結構(包括對稱形狀和不規則形狀)給出模擬結果。The international safety management ( ism ) code was adopted by the international maritime organisation ( imo ) in november 1993 and became applicable starting july 1, 1998, to passenger ships including passenger high - speed craft ( hsc ), oil and chemical tankers, gas carriers, bulk carriers, high - speed cargo vessels of 500 gross registered tonnes ( grt ) and over
《國際安全管理規則》於一九九三年十一月獲國際海事組織通過,由一九九八年七月一日起適用於客船,包括載客高速船在內,以及所有總噸位達到或超過500噸的油輪、化學品液貨船、氣體運輸船、散裝貨輪和載貨高速船。It is impossible to be certain. there is no sign of imminent hostilities. it appears that prc military activity is somewhat elevated, but reports in the media have been exaggerated
過去十年它已加入禁止核武擴散條約、化學武器公約、生物武器公約、全面禁止核試條約,上述每一條約都有明確的規則、申報要求與檢查制度。Attributes reduct, mining classification rules, and discretizing values of quantitative attributes are three fields in mining classification rules
屬性約簡、分類規則提取、數量屬性離散化是分類規則挖掘的三個方面。Bringing forward an intelligent decision method of image segmentation based on roughset theory to make the system automatically select segmentation algorithm in simple scenes. firstly, it selects some representative segmentation algorithms to make up of an algorithm library, which is used to process kinds of sample images ; secondly, it makes the decision informationtable utilizing diversified numerical features extracted from the sample images and the optimalsegmentation algorithm of each sample image according to segmentation quality evaluationcriterion ; finally, it applies rough set theory on discretization and attribution reduction of
為了使系統在簡單場景下能夠通過自動選取分割演算法來提取目標,提出了一種基於粗糙集理論的圖像分割智能決策方法。首先選取若干具代表性的分割演算法構成演算法庫,並用它們對各種樣本圖像進行分割;然後利用從樣本圖像中提取出來的各種數值特徵,並根據圖像分割質量評價標準評判出各樣本圖像的最優分割演算法,用其構成決策信息表;最後應用粗糙集理論來對決策信息表進行離散化處理和屬性約簡,以生成圖像分割演算法選取的決策規則。Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system
在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上網資格審查;針對網路安全審計,重點研究了網路安全審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s架構的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。Firstly, influence factors of generalization of neural network are presented in this thesis, in order to improve neural network ’ s generalization ability and dynamic knowledge acquirement adaptive ability, a structure auto - adaptive neural network new model based on genetic algorithm is proposed to optimize structure parameter of nn including hidden layer nodes, training epochs, initial weights, and so on ; secondly, through establishing integrating neural network and introducing data fusion technique, the integrality and precision of acquired knowledge is greatly improved. then aiming at the incompleteness and uncertainty problem consisting in the process of knowledge acquirement, knowledge acquirement method based on rough sets is explored to fulfill the rule extraction for intelligent diagnosis expert system, by completing missing value data and eliminating unnecessary attributes, discretization of continuous attribute, reducing redundancy, extracting rules in this thesis. finally, rough sets theory and neural network are combined to form rnn ( rough neural network ) model for acquiring knowledge, in which rough sets theory is employed to carry out some preprocessing and neural network is acted as one role of dynamic knowledge acquirement, and rnn can improve the speed and quality of knowledge acquirement greatly
本文首先討論了影響神經網路的泛化能力的因素,提出了一種新的結構自適應神經網路學習演算法,在新方法中,採用了遺傳演算法對神經網路的結構參數(隱層節點數、訓練精度、初始權值)進行優化,大大提高了神經網路的泛化能力和知識動態獲取自適應能力;其次,構造集成神經網路,引入數據融合演算法,實現了基於集成神經網路的融合診斷,有效地提高了知識獲取的全面性、完善性及精度;然後,針對知識獲取過程中所存在的不確定性、不完備性等問題,探討了運用粗糙集理論的知識獲取方法,通過缺損數據補齊、連續數據的離散、沖突消除、冗餘信息約簡、知識規則抽取等一系列的演算法實現了智能診斷的知識規則獲取;最後,將粗糙集理論與神經網路相結合,研究了粗糙集-神經網路的知識獲取方法。On the following, on the basis of formulas given above, three kinds of effects due to ionosphere are presented : image shift due to group delay which was caused by the difference between the group velocity and the velocity of light in the ionosphere ; image distortion due to ionospheric dispersion which can create second phase error of lfm signals ; the last, the phase perturbation caused by the irregularities of the ionosphere can reduce the coherent length and affect azimuthal resolution
文中主要研究了電離層的三種影響:信號經過電離層傳播的群延遲引起的成像偏移;電離層的色散效應給線性調頻信號帶來二次相位誤差,導致圖像退化、失真;以及電離層的閃爍、湍流等不規則性引起的信號相位起伏。在此基礎上,比較分析了不同波段、帶寬條件下電離層的影響。This paper studied the dispersion and the field distribution of the wave - guide with helical corrugation operating in 8mm wave band. the main works of this dissertation are listed as following : 1. based on the theory of coupled - wave, using the method of perturbation, the coupled - wave equations are derived and the rule of coupling is gotten. 2
2 .利用螺旋波紋波導的耦合波方程和模式耦合規則,得到波導色散方程,利用visualfortran平臺編程進行數值模擬,分析相關物理參數對色散特性的影響;對波導的行波幅值耦合方程進行數值模擬,從而簡化了耦合方程,在此基礎上利用visualfortran平臺編程進行數值模擬,分析螺旋波紋波導的場分佈情況。The result indicates that when the air content of the concrete changes from 1 to 4 percent, the polarized resistance of the identical flow electricity time increases along with the increment of the air content, the corrosion current density reduces along with the increment of air content, the chloride ion diffusion coefficient reduces with the increment of air content ; when air content changes from 4 to 6 percent, the rule of the change of the polarized resistance and corrosion current density happens to be the opposite, the diffusion coefficient of the chloride ion increases along with the increment of air content ; when the air content is 4 percent, the rust - resisting property of concrete is best, and so is the impermeability of the concrete
試驗結果表明,混凝土的含氣量在1 . 9 % ~ 4 . 2 %變化時,極化電阻隨含氣量的增大而增大,腐蝕電流密度隨含氣量的增大而減小, cl -擴散系數隨含氣量的增大而減小;當含氣量在4 . 2 % ~ 6 . 4 %變化時,極化電阻、腐蝕電流密度和cl -擴散系數的變化規律則相反;當含氣量為4 . 2 %時,抗鋼筋銹蝕性能最佳,抗滲性最好。 cl -擴散系數與鋼筋銹蝕參數在一定程度上有著良好的相關性,抗滲性的結果較好地反映了混凝土中鋼筋銹蝕的程度,可以用cl -擴散系數評價引氣混凝土的抗鋼筋銹蝕性能。The forming - nucleus drive power could form numerous little crystal nucleus under natural melting temperature. the formation of tic particles in the melt could be divided into two phases which was forming - nucleus and growth. the forming mechanism of tic was : melting ti first surrounded c, then ti melting in the alloy and c formed a complicated reaction mesosphere on the carbon surface
根據熱力學及動力學分析,認為在碳顆粒界面處tic的形核率很高,形核驅動力足以在正常的熔煉溫度下形成眾多的小晶核;熔體中tic顆粒的合成可分為形核與長大兩個階段,其形核機制為:首先活性ti原子包圍c ,溶入合金中的ti與c在碳表面形成一復雜反應中間層,隨著反應進行, ti和c顆粒不斷減少,生成的tic不斷彌散分佈於熔體中;其長大過程伴隨著tic顆粒的相互堆砌、聚集和形態規則化。Considering the defects of typical algorithm for mining frequent itemsets, this dissertation puts forward hy algorithm which is designed to mine association rules and based on the hash technique and the optimized transaction reduction technique
針對經典頻繁項集挖掘演算法的不足,提出了進行關聯規則數據挖掘的基於散列技術和優化的事務壓縮技術的hy演算法。Besides the advanced manufacturing technology and theory, a series of correlative technologies are required to the implement of networked manufacturing, especially the technologies of distributed computing, information integration and artificial intelligent etc. aiming at their limitations, the paper reconstructed the key supporting technologies employing the last network technologies and protocols, and established a new architecture of networked manufacturing. finally, the demonstrational researches are conducted with " flexible design and manufacturing system of key parts in large - scale antenna " as prototype. the distributed computing platform available of networked manufacturing is constructed with the distributed object technologies such as corba, dcom, rm1 etc, but those rpc modules bring obstacles to the development of global manufacturing due to their limitations
網路化製造系統是個分佈、異構、鬆散耦合的智能系統,除了先進製造技術與理念本身,網路化製造的具體實現與實施還需要一系列相關技術的支撐,特別是分散式計算、製造信息集成、人工智慧等,論文正是針對當前網路化製造中上述關鍵支撐技術的不足與局限,運用下一代internet核心規范webservices及其相關技術如xml 、 soap 、 wsdl 、 uddi等,提出了面向全球的網路化製造全新分散式計算解決方案( global - orienteddistributedcomputing , godc ) ;構造了基於xml - schema的製造產品數據描述語言( pdmlbased - xml - schema ) ,給出了express xml及steppart21 xml的映射規則,並對基於xml step pdm網路化製造信息集成方案進行了研究;同時運用webservices 、 xml等先進技術與規范對網路化製造的multi - agent模型、表示、通訊、調度等進行了研究與重構;最後,以「大型天線關鍵零件網路化製造」為原型進行了應用研究。Firstly, this paper improves single dimensional association rule mining algorithm aprioritidlist based on deep research on association rule mining algorithms, and advances an efficient multidimensional association rule mining algorithm aprioritidlist + that is suitable for vulnerability database of rdbms. furthermore, the algorithm is applied on vulnerability database including data preparation, implement of the algorithm and analysis of experiment results, where data preparation is mainly to select some from numerous vulnerabilities and vulnerability attributes that are suitable for association rule mining to do experiments, meanwhile do the discrete process on quantified attribute values
本文首先在深入研究關聯規則挖掘演算法的基礎上,對其中的單維關聯規則挖掘演算法aprioritidlist進行改進,提出了一種適合關系型弱點數據庫的高效的多維關聯規則挖掘演算法aprioritidlist + ;並且將該演算法應用到弱點數據庫中,包括數據準備、演算法實現和實驗結果的分析,其中數據準備主要是對數量龐大的弱點信息和弱點屬性進行挑選,取出一部分適合於關聯規則挖掘的弱點信息來進行實驗,同時也對量化屬性值進行了離散化處理。Based on optimal hydrothermal modification conditions, the regular hexagonal plates of mg ( oh ) 2 with uniform size and smaller bet surface area were formed after the hydrothermal treatment
在合理的水熱改性條件下,能夠制備出大晶型、低比表面積、高分散的規則六方片狀氫氧化鎂阻燃劑。At present, there is still a great deal of problem in the application of the secure model of the distributed database. under common circumstance, the secure usually is self - contradict with vivid in the database, while customer wanting to get stronger and vivid capability, needing the sacrifice to the database secure in some extent, vice versa. based on distributed database system and secure characteristic, this text analyzed its database safe strategy and related secure model, the system appearance and operate rule, the system appearance and operate rule, studied the customer role management, safe strategy and the role authorition problem, specially emphatically studied the bell. lapadula model. ( including its basic concept, system appearance, related operation and the secure rule gather ). according to the actual application environment, this text carried bell. lapadula model to entity to turn, through a research discover that model adoption compulsory secure strategy, attain a vivid secure control not easily, so increase the secure strategy of the independent access control mechanism to carry on " flabby " to the original model, and relatedly increased rule, put forward a new kind of secure mechanism - ddm ( the distributed database discretionary mandatory ). turn the rule principle according to the ddm secure mechanism and entity, designed a secure controller of database - dds ( the distributed database secure distribute ) controller adopted ddm secure mechanism, and established the secure control mechanism of the dds secure controller
拉帕丟拉模型進行實體化,通過研究發現該模型採用強制性安全策略,不易做到靈活的安全控制,因此添加自主存取控制機制的安全策略對原模型進行「鬆弛」 ,並相應的增加了規則,提出一種新的安全機制? ? ddm ( distributeddatabasediscretionaryandmandatory ,分散式數據庫自主與強制性)安全機制。基於實體化規則原理,設計了一個採用ddm安全機制的數據庫控制器? ? dds ( distributeddatabasesecure ,分散式數據庫安全)控制器,並設置了dds安全控制器的安全控制機制。通過dds安全控制器在實踐中的應用,本文分析了dds安全控制器的各項功能和安全特點,設計了實際應用中dds控制器的管理方案,實現了分散式數據庫安全控制。This paper tries to make use of the cellular automata ’ s sensitivity to the initial state called avalanche effect, by swiftly diffusing and confusing the plaintext to be hashed, a cellular automata based one - way hash function is proposed
本文試圖利用細胞自動機某些演化規則對于初態的雪崩效應,通過對散列明文信息實現快速擴散與混淆來構造單向hash函數。分享友人