簇分析 的英文怎麼說

中文拼音 [fēn]
簇分析 英文
cluster analysis
  • : Ⅰ動詞[書面語] (聚集; 簇擁) crowd together; form a cluster; pile up Ⅱ名詞(聚集成的團或堆) clus...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ動詞1. (分開; 散開) divide; separate 2. (分析) analyse; dissect; resolve Ⅱ名詞(姓氏) a surname
  1. The eleven micro element analysis about allium caocervate

    生蔥中11種微量元素含量
  2. Phylogenetic analysis reealed that the majority of oine isolates form a distinct cluster more similar to caprine lentiirus prototypes than to the isna irus prototype

    系統進化顯示大多數羊的隔離群病毒形成的獨特群更類似於山羊的慢病毒而不是綿羊髓鞘脫落病毒。術語可能不大專業,大概是這個意思吧! ?
  3. The paper will study the upper questions based on the two interconnection networks. first, we give a fault - tolerant routing algorithm under the connectivity of the crossed cube in o ( n ) time and the length of the longest routing path ; second, with the rapid progress in vlsi, the failing probability of processors and links is very low, the traditional connectivity underestimates the resilience of large networks / here by applying the concept " conditional connectivity " introduce by harary, we show that the n - crossed cube can tolerate up to 2n - 3 ( n > 2 ) processors failure and remain connected provide that all the neighbors of each processor do not ' fail at the same time, the result is the same as the hypercube. we also give a related algorithm in o ( n ) time, and the length of the longest path ; third, we apply cluster faun tolerance introduced by q. - p

    根據menger定理, n -維交叉立方體可以容納n - 1個故障頂點,我們給出了它的時間復雜度為o ( n )的容錯路由選擇演算法及其最長路徑長度;在此基礎上本文證明, n -維交叉立方體的條件連通度為2n - 2 ( n 2 ) ,並給出了相應時間復雜度為o ( n )的演算法及其最長路徑長度;除此之外,本文還證明當n -維交叉立方體中的故障個數不大於n - 1 ,其直徑不大於1 ,故障頂點總數不超過2n - 3 ( n 2 )時,交叉立方體中任兩個無故障頂點都至少有一條可靠路徑。
  4. The protein - storing cells in swietenia macrophylla were found to be populus - type, i. e. ordinary parenchyma cells containing both vacuolar protein inclusions and starch grains

    用21kda蛋白質的抗血清進行兔疫印跡表明, 18kda蛋白質和21kda蛋白質有相同的抗原決定
  5. After the briefly present the origin and features of internet protocol version 6 ( ipv6 ), the paper detailedly introduced the conception, characters, security technologies of vpn, and main tunnel protocols used to implement and deploy vpns. after analyzing and comparing these technologies of realizing vpns, we choosed ipsec. then, the paper analyzed in the ipsec structure, function, work mode, and its components such as authentication header ( ah ), encapsulating security payload ( esp ), internet key exchange ( ike ), encryption and authentication algorithms, security association, security policy, and how they cooperate with each other in order to secure ip packages

    在簡要介紹ipv6協議的由來和優點之後,詳細闡述了虛擬專用網的概念、特點、安全技術及實現的關鍵隧道協議,通過對實現技術的比較,選用了安全性強大的ipsec隧道技術,接著深入研究了ipv6安全協議ipsec的體系結構、操作模式,詳細論述了ipsec協議的各個組成部,如認證報頭ah協議、封裝安全載荷esp協議、密鑰管理ike協議、加密認證演算法、安全聯盟和安全策略等,以及這些組件之間如何協作,來共同實現對網路層ip數據包的安全保護。
  6. Factorization of adjoint polynomials of kinds of graphs with chromatically equivalent analysis

    若干圖的伴隨多項式的因式解及色性
  7. The factorization of adjoint of polynomials sg - class graphs and chromatically equivalence analysis

    類圖的伴隨多項式的因式解及色性
  8. The factorization of adjoint polynomials of eg class graphs and chromatically equivalence analysis

    類圖的伴隨多項式的因式解及色性
  9. The factorization of ad joint polynomials of kinds of graphs and chromatically equivalent analysis

    若干圖的伴隨多項式的因式解及色性
  10. The factorization of adjoint polynomials of kinds of graphs and chromatically equivalence analysis

    幾類圖的伴隨多項式的因式解及色性
  11. The factorization of ad joint polynomials of ss - class graphs with chromatically equivalence analysis

    一類圖的伴隨多項式的因式解及色性
  12. The factorizationes of adjoint polynomials of sp - class graphs and chromatically equivalence analysis

    類圖的伴隨多項式的因式解及其色性
  13. The comparison of the topology designed by senior fellow apprentice and the topology designed by this paper shows that the topology which is put forward by this paper is better. it reduces the hardware outgoings and makes the structure of the multi - processors systematic

    通過比較,選擇了更適合於系統的基於結構的拓撲結構設計方案,節省了硬體資源的開銷,規范了系統的組織結構。
  14. The minimum of resistivity at low temperature range can be explained by magnetic scattering which corresponds to the peak of magnetization. all of the experimental data can be well explained on the basis of vrh model, which comes from not the clusters, but the inhomogenous magnetic background. based on the mechanism of transport, cmr effect is elucidated

    體系磁性和電性的影響,通過實驗得出了下列結論: q ) dy對la的替代產生了無規的磁勢,破壞了mn o mn長程鐵磁序,導致在tn丁tc溫區出現團玻璃態,在t tn溫區,由於dy子大的磁矩, la ( dy亞晶格和mn亞晶格磁矩強烈的耦合,體系呈現反鐵磁態
  15. The content of each part follow as : in the first chapter, as start point and base of the paper, this part focuses on the basic study of definition characteristic of no, and the existing base of no - e - commerce environment ; in the second one, this part studies the theory base of no comprehensively applying the theories of core competence competent strategy and transaction cost ; chapter three studies the no from the coordination of no, and gives the structure clarification and characteristic of no firstly, at the same time, put forward the concept of virtual enterprise cluster ; based on such conclusion, studies the model of no from life cyc organization level process and value chain, and operational mode ; in chapter four, a theoretical explanation was addressed on the above structure by modeling no with game theory and graphic theory ; in the fifth chapter, on the bases of analysis of no operational risks, coordination mechanism of no was studied by individually modeling the no without core and no with core, and then put forward the solution for coordination mechanism of no ; as an important component of coordination mechanism of no, chapter six explored some basic concept of trust and importantly put forward the way of how to build trust in no, especially investigated the supporting function of valid reputation mechanism of no for the trust building, importantly an operational method on building reputation mechanism and evaluation method in no were given ; the last chapter applied the conclusion of the paper to investigate the famous trade web - sunbu. com analyzed its shortcoming and gave the advices of developing

    全文共為七章,主要內容如下:第一章作為全文的理論出發點和基礎,圍繞網路組織的定義、特徵以及網路組織生存基礎- -電子商務環境等方面對網路組織的基本概念進行了闡述;第二章綜合運用核心能力、競爭戰略和交易費用理論對網路組織產生的理論基礎進行闡述;第三章首先從組織協調的角度對網路組織進行了研究,給出了網路組織的結構,類和特徵,同時並給出了虛擬企業群;然後在此基礎上別研究了網路組織的生命周期模型、層次模型、過程模型、價值鏈模型,以及運行模式;第四章綜合運用博弈論、圖論的相關知識,通過構建網路組織的模型,對上一章所研究的網路組織結構的形成機理給出了一種理論解釋;第五章在網路組織運行風險的基礎上,別建立無盟主網路組織的博弈論模型和有盟主網路組織的博弈論模型,詳細研究了網路組織的協調機制,然後給出了網路組織協調機制的解決方案;第六章作為網路組織協調機制的重要組成部,本章在討論了網路組織中建立信任機制的必要性的基礎上,研究了網路組織信任關系的類型,提出了在網路組織中如何建立信任機制。
  16. The properties of the eas are hidden as the peak is sharp around zero

    由於兩組探測器相隔太近,空氣射引發的峰值只出現于零附近,不利於宇宙射線的特性。
  17. Photon identification in the momentum range from 0. 5 to 100 gev by using pca method is presented and compared with the results attained by traditional shower topology method

    與傳統的射拓撲相比,在同等的效率下,理a區電磁射和強子封的能力將提高10腸
  18. On the other hand particle identification is provided during offline analysis by algorithms that examine the electromagnetic shower shape in phos to discriminate electromagnetic particles against hadrons

    之二,對phos中的射進行拓撲,從而區電磁射和強子射。
  19. To facilitate the detection of gene replacement, apr gene was placed in the middle of the two inserts. orit from e. coli plasmid rk2 was also incoporated into the vector, therefore, pij903 derivatives can be mobilized from e. coli into streptomyces sp. fr - 008 by either bi - parental conjugation or by conjugation between streptomyces

    為了在克隆完整基因時避免這兩方面的影響並能隨機地獲得dna大片段,我們將第二代yac載體pjs97 - pjs98改造成為適合於在白林泉鏈黴菌基因組中dna大片段的基因置換與克隆鏈黴菌中被克隆大片段功能的基因置換載體。
  20. For the sake of prolonging the lifespan of nodes and improving the performance of stable and routing, a self - adaptive routing algorithm based on analytic hierarchy process ( ahp ) is proposed. the new algorithm induces ahp to cluster self - adaptively, and then it makes virtual backbone network by clusters and sinks, after that it creates routes in the virtual backbone network

    模擬實驗表明新演算法較flooding節能,能較好的克服flooding演算法中報文冗餘度高、能耗大等不足。為了盡可能地延長節點的生存期限,提高網路的穩定性與路由性能,提出了一種基於層次法的自適應路由演算法。
分享友人