規則前提 的英文怎麼說

中文拼音 [guīqián]
規則前提 英文
rule premise
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • : Ⅰ名詞1 (在正面的) front 2 (次序在先的) first; top 3 (過去的; 較早的) ago; before; preceding...
  • : 提動詞(垂手拿著) carry (in one's hand with the arm down)
  • 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
  1. Subsequently by taking “ ancient - style poems ” as center, make an exploration into the acceptant condition of traditional poems collection to canons in the preceding dynasties at the time of “ canon ” being established, from a comprehensive view by editor ' s selection basis, arrangement of collection and readers ' acceptability : among which the “ ancient poems collection ” to the superficial succession and meaning transfer of tu ' s poems canon as well as to the polemic interpretation and conclusion of five - character and seven - character poems canon, and the acceptability and misreading of “ poems of transcription in modern style ” in the mid of ching dynasty to “ ancient poems collection ”, all of which are sufficient to verify the alternative of “ canon ” for traditional poems collection that most of them adopt measures of succeeding canon in early times first, then making an increase and reduction ; while the selection of canon takes “ direct variation of polemics ” as premise, followed by a consideration of degree of art values ; it can be the concrete index of trend to make comments on poems on the selection and interpretation of canon for masters of each school

    其後,再由綜觀編者評選基準、選集編排、讀者接受等多重角度,以王士禎《古詩選》為中心來探究常詩選集在創建典律時,對代典律的接受狀況:其中由《古詩選》對杜詩典律的表面繼承與意義轉移、對五古、七古詩典律的辨體詮釋與總結,以及清中葉《今體詩鈔》等選集對《古詩選》的接受與誤讀…等,皆足以驗證常詩選集的典律交替,大多採取先繼承代、再漸進轉換新典律的作法;且其典律的選立每先以辨體之正變為,再考量藝術價值的高低;而於各體名家典律的選擇與詮釋上,通常可作為其論詩趨向的具體指針。
  2. A member who seeks the president s permission to address the council under rule 21, or of the rules of procedure on the following matters should provide an advance copy of the intended address to enable the president to decide whether the address may provoke a debate, which is not permitted under rule 21 of the rules of procedure

    倘議員請求立法會主席準許其根據議事第21 3 4a或5條就下列事項向立法會發言,該議員應在會議交其擬發表的演辭,以便立法會主席決定該演辭是否可能引發議事第21 6條所不容的辯論:
  3. Fist of all, on the basis of the research of agone boffins, this author investigates the interaction mechanism of bolts and rock, and introduces the elastic ? lastic analytical resolution which is consist of the liner structure, the equivalent reinforced wall rock and the original wall rock in the simple loading from the equivalent well - proportioned view ; this solution is very important meaning for the engineering design. on the basis of coulomb friction model, the author introduces the finite element equation of the contact problem in order to provide the academic foundation for the application of msc. marc. finally, combining the engineering practice of the non - linear analysis of shield tunnel through yellow river of the south - north water transfer and using the model of friction, the author researched the evolution law of stress and displacement field in the structure of grouted rock bolts, and analyzed the effect to the stress and deformation of surrounding rock mass due to anchor supports

    首先,在人研究成果的基礎上,對錨桿與圍巖的相互作用機理進行研究,利用全長錨固錨桿的中性點理論,從等效均化的角度來考慮錨桿對圍巖的加固作用,並推導了在簡單荷載作用下,含有襯砌、等效加固后的圍巖、原始圍巖三者的彈塑性解析解,對工程設計有著重要的參考意義;在數值模擬方面,以考慮錨固圍巖滿足化庫侖摩擦模型為基礎,利用虛功原理推導了接觸問題的有限元方程的計算格式,為開發運用大型商用有限元軟體msc . marc供了理論根據,也形成了本文的理論基礎:最後,論文以南水北調東線穿黃隧洞穩定性分析項目為工程實例,利用本文所述的接觸問題的摩擦模型理論,對錨桿支護結構的應力場、位移場的變化律進行了研究,分析了加錨支護對隧洞圍巖應力、變形的影響。
  4. Optimized association rules are permitted to contain uninstantiated attributes. the optimization procedure is to determine the instantiations such that some measures of the roles are maximized. this paper tries to maximize interest to find more interesting rules. on the other hand, the approach permits the optimized association rule to contain uninstantiated numeric attributes in both the antecedence and the consequence. a naive algorithm of finding such optimized rules can be got by a straightforward extension of the algorithm for only one numeric attribute. unfortunately, that results in a poor performance. a heuristic algorithm that finds the approximate optimal rules is proposed to improve the performance. the experiments with the synthetic data sets show the advantages of interest over confidence on finding interesting rules with two attributes. the experiments with real data set show the approximate linear scalability and good accuracy of the algorithm

    優化關聯允許在中包含未初始化的屬性.優化過程就是確定對這些屬性進行初始化,使得某些度量最大化.最大化興趣度因子用來發現更加有趣的;另一方面,允許優化和結果中各包含一個未初始化的數值屬性.對那些處理一個數值屬性的演算法進行直接的擴展,可以得到一個發現這種優化的簡單演算法.然而這種方法的性能很差,因此,為了改善性能,出一種啟發式方法,它發現的是近似最優的.在人造數據集上的實驗結果表明,當優化包含兩個數值屬性時,優化興趣度因子得到的比優化可信度得到的更有趣.在真實數據集上的實驗結果表明,該演算法具有近似線性的可擴展性和較好的精度
  5. The part puts forward the law foundations of legislating these rules, the main disputable ideas regarding these rules at present ; gives the cardinal point of making rules of excluding illegal evidence on the basis above and the difficulties when making these rules in china

    本部分出了我國非法證據排除的法律依據,目關于對非法排除的主要爭議觀點,在此基礎出了確立非法證據排除的基點,以及在我國確立非法證據排除所面臨的困難。
  6. As a whole the system may compart three modules : ndis drivers in the kernel mode, the dll program in the user mode and the user application program, adopting the share memory technology three modules realize the data share of the control canal rule, the encapsulation data and the network neiborhood name and so on, so we can easily finis1 " the packet authentication by the control canal rule, improve the filtering efficiency of the system. whereas the current of firewall technology, the system has wide utily value and business value. this software is based on windows 2000 operating system, the programming language is chosen as visual c + + 6. 0 and win2000 ddk

    從總體上可以劃分為以下三個模塊:核心層的ndis網路驅動程序、應用層的動態鏈接庫程序以及用戶應用程序,這三個模塊之間通過內存共享技術完成對控管、封裝數據、網上鄰居名字列表等數據的讀寫操作,從而很方便的根據控管實現了對網路封包的認證操作,高了系統的過濾效率。鑒于目防火墻技術的發展趨勢,本系統具有廣泛的實用價值和商業價值,因此具有一定的推廣景。軟體的開發基於windows2000操作系統,開發語言採用visualc + + 6 . 0和win2000ddk 。
  7. The ids of the paper is network - based anomaly detection system. with the help of data mining technology, we bring forward a measure to describe the normal state of the network traffic and user behavior and extracting the useful rule from large network data. so we can establish the knowledge warehouse which describe the normal state of the network traffic and user behavior. the knowledge warehouse can be the standard in order to judge the normal state. we can find the dubitable connections according to account the state and anomly instances of connections

    論文在描述網路應用和用戶行為時採用數據挖掘技術從海量的網路數據中取有用的,構建了一個描述正常狀態下的網路應用和用戶行為的集,這個集是用來判斷網路應用和用戶行為是否正常的標準,論文根據這個標準分析當網路連接的異常情況,將可疑的連接找出來。
  8. This thesis discusses the exclusion clause effectiveness judgment issues from four aspects. firstly, the precondition of exclusion clause effectiveness judgment is that the term must be included in the contract and become one part of it

    從免責條款效力判斷的是免責條款須訂入合同入手,全面闡述了免責條款訂入合同的、有效性判斷的標準及效力是否及於第三人等問題。
  9. Rules and the past, small ball - do not ring out, but much more difficult to upgrade. the key is the game ball toward the placement and speed, filling

    和以一樣,別讓小球落出圈外,難度可是大大升了,游戲關鍵是看準小球的落點和速度,加油吧!
  10. As mentioned earlier, hunters are individualists who will bend some rules to nail the deal

    面已經到,獵人為達成協議會打破一些俗套或
  11. This chapter discusses in detail the principles and approaches of playgame environment and space plan from the view of architecture design, in order to direct the practice of the elementary school campus in reality

    從建築設計專業角度出發,具體探討素質教育下,小學校園兒童游戲活動空間劃設計的原和方法,以指導現實的建設實踐。
  12. Under the principal of making foreign things serve china and the status in quo of large gap between agriculture and industry, the following advices should be practiced : re - recognizing the meaning of nursing the agriculture ; constructing formal institutions for promising the predicable benefits ; utilizing the adjustment and disposition function of public finance policies ; establishing the organization to improving agriculture, farmer, rural ; accelerating the construction of compositive system of agriculture information ; consummating the mechanism of innovation and appliance of agriculture technology and constructing morals and cultural system during nursing the agriculture

    本著洋為中用的思想,針對目我國工與農、城與鄉差距過大的現狀,出為了降低交易費用,對重新認識以工哺農觀念、建立能保證可預期收益的以工哺農的正式體系、發揮以政府為主導的財稅政策的調節和配置作用、建立改善「三農」的組織系統、完善農業綜合信息體系、農業科技創新與成果推廣機制和建設道德文化體系等方面出了相應的政策建議。
  13. The first two axioms elevate territorialism into the main operating principle of private international law, a position that remained unchallenged for many generations

    兩個原將屬地主義升為國際私法領域的主要操作,這種地位多年來未受到挑戰。
  14. This article canvass the status quo of the archive ' s automatization administration and the develop status of data mining, and discusses how to combine the data mining technology with the archive work from data cleaning means, data mining arithmetic, and data storage etc. and this article put forword a data mining syst em design idea. this article ' s structure is : first, in allusion to the archive data status quo, the pretreatment work of archive data that include data quality evaluation, data cleaning and data commut - ation process is bringed forword ; second, in the process of realizating data mining, the article discusses conception description, association rule, class three familiar means of applicating data mining, also put inforword the concrete arithmetic and the program design chart, and discusses the range and the foreground of all kinds of arithmetic when they are applicated in the archive ; third, the base of so you say, this article also discusses the importance of the archice applicate data storage and the means of realizing it ; last, the article discusses seval important problem of realizing an archive data mining system from data, diversity, arithmetic multiformity, mining result variety and the data pretreatment visibility, mining object descriptive visibility, mining process visibility, mining result visibil ity, user demand description and problem defining etc aspect. the article ' s core is how to import data mining technology in the archive work

    本文評述了檔案自動化管理現狀和數據挖掘技術的發展狀況,從數據清洗方法、數據挖掘演算法、數據倉庫的建立等方面論述了如何將數據挖掘技術與檔案工作相結合的具體思路,並出了一個數據挖掘系統的設計思想。文章首先,針對檔案數據的現狀,出了應對檔案數據進行預處理工作,包括數據質量評估、數據清理、數據變換和歸約等過程;其次,在具體實現數據挖掘過程中,本文結合檔案數據的特點探討了概念描述、關聯、分類等三種常見挖掘形式的實現方法,出了具體的實現演算法和程序設計框圖,並論述了各種演算法在檔案工作中的應用范圍及景;第三,在上述基礎上,又論述數據倉庫在檔案數據挖掘中的重要性並出了實現一個檔案數據倉庫的方法;最後,從處理數據的多樣性、演算法的多樣性、挖掘結果的多樣性、數據預處理可視化、挖掘對象描述的可視化、挖掘過程可視化、結果顯示可視化、用戶需求的描述及問題定義等幾方面討論了實現一個檔案數據挖掘系統的幾個重點問題。全文以探討如何將數據挖掘技術引入到具體的檔案工作實踐中為核心。
  15. This is without guessing but following rules and buying when the big people buy and of course you are with the trend made by the big traders

    這就是不要臆測但是要遵從,當主力買的時候買,當然你也要在順應莊家趨勢的下。
  16. 2. as the premise of urban land rearrangement planning, research on selecting rearrangement zone was carried on, including its principle, acting procedure, decision - making method and steps, etc. 3. the target and its confirmable principle of urban land rearrangement planning were put forward definitely

    城市土地整理區的選擇是城市土地整理劃的條件,對整理區選址原、運作程序、決策方法及其步驟等進行了詳細的研究。
  17. A novel dynamic evolutionary clustering algorithm ( deca ) is proposed in this paper to overcome the shortcomings of fuzzy modeling method based on general clustering algorithms that fuzzy rule number should be determined beforehand. deca searches for the optimal cluster number by using the improved genetic techniques to optimize string lengths of chromosomes ; at the same time, the convergence of clustering center parameters is expedited with the help of fuzzy c - means ( fcm ) algorithm. moreover, by introducing memory function and vaccine inoculation mechanism of immune system, at the same time, deca can converge to the optimal solution rapidly and stably. the proper fuzzy rule number and exact premise parameters are obtained simultaneously when using this efficient deca to identify fuzzy models. the effectiveness of the proposed fuzzy modeling method based on deca is demonstrated by simulation examples, and the accurate non - linear fuzzy models can be obtained when the method is applied to the thermal processes

    針對模糊聚類演算法不適應復雜環境的問題,出了一種新的動態進化聚類演算法,克服了傳統模糊聚類建模演算法須事先確定數的缺陷.通過改進的遺傳策略來優化染色體長度,實現對聚類個數進行全局尋優;利用fcm演算法加快聚類中心參數的收斂;並引入免疫系統的記憶功能和疫苗接種機理,使演算法能快速穩定地收斂到最優解.利用這種高效的動態聚類演算法辨識模糊模型,可同時得到合適的模糊數和準確的參數,將其應用於控制過程可獲得高精度的非線性模糊模型
  18. And reliability threshold value of the precision, importance of the precision and the maintenance coefficient are added to the production expression

    並且在產生式表示中增加了規則前提的可信度閾值、規則前提的重要度以及所涉部件的可維性系數。
  19. While rule - based approaches have achieved great success in precision, but the shortcoming of this method is that the rules cost too much manpower and material resource. on the contrary, the statistic - based method can be effective in reducing human and material cost. meanwhile, the result achieved by this method is also very close to or even better than rule - based methods when the scale of the corpus is appropriate

    者在精度上取得了比較大的成績,但是這種方法的缺點在於取耗費了大量的人力和物力;相反,後者可以有效地減少人力和物力的投入,同時在語料模適當的時候,可以取得到的效果也非常接近於甚至超過基於的方法,另外基於統計的方法還具有的較強的泛化能力。
  20. The compensation of attainable interest, whose aim is getting the injured party back to the state seems like a contract is fully performed, is a symbol of realizing the principle of full compensation. as the character of futurity and uncertainty, the extent of compensation is usually restricted by terms prescribed in the contract or the rules in particular regulation. to avoid the trouble of calculation, the parties may prescribe a certain sum of compensation or a method for calculation of damages in light of the degree of breach

    本文從宏觀到微觀,層層揭開可得利益賠償的計算問題,首先從可得利益賠償的計算煉出一個普遍適用的計算公式,並展開分析了包含于其中的各種計算,隨后對可得利益的計算方法進行了介紹、評價和選擇,並深入計算和計算方法的背後,探究在計算可得利益損失的過程中所應把握的性標準,即以何者為出發點的人之標準、時間標準、地點標準和價格標準。
分享友人