計數規則 的英文怎麼說

中文拼音 [shǔguī]
計數規則 英文
counting rule
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : 數副詞(屢次) frequently; repeatedly
  • : Ⅰ名詞1 (畫圓形的工具) instrument for drawing circles 2 (規則; 成例) rule; regulation 3 [機械...
  • : Ⅰ名詞1 (規范) standard; norm; criterion 2 (規則) regulation; rule; law 3 (姓氏) a surname Ⅱ...
  • 計數 : count; tally; counting計數卡 numbered card
  • 規則 : 1. (規定的制度或章程) rule; regulation; ordination; prescribed procedure; rope 2. (整齊) regular
  1. Fist of all, on the basis of the research of agone boffins, this author investigates the interaction mechanism of bolts and rock, and introduces the elastic ? lastic analytical resolution which is consist of the liner structure, the equivalent reinforced wall rock and the original wall rock in the simple loading from the equivalent well - proportioned view ; this solution is very important meaning for the engineering design. on the basis of coulomb friction model, the author introduces the finite element equation of the contact problem in order to provide the academic foundation for the application of msc. marc. finally, combining the engineering practice of the non - linear analysis of shield tunnel through yellow river of the south - north water transfer and using the model of friction, the author researched the evolution law of stress and displacement field in the structure of grouted rock bolts, and analyzed the effect to the stress and deformation of surrounding rock mass due to anchor supports

    首先,在前人研究成果的基礎上,對錨桿與圍巖的相互作用機理進行研究,利用全長錨固錨桿的中性點理論,從等效均化的角度來考慮錨桿對圍巖的加固作用,並推導了在簡單荷載作用下,含有襯砌、等效加固后的圍巖、原始圍巖三者的彈塑性解析解,對工程設有著重要的參考意義;在值模擬方面,以考慮錨固圍巖滿足化庫侖摩擦模型為基礎,利用虛功原理推導了接觸問題的有限元方程的算格式,為開發運用大型商用有限元軟體msc . marc提供了理論根據,也形成了本文的理論基礎:最後,論文以南水北調東線穿黃隧洞穩定性分析項目為工程實例,利用本文所述的接觸問題的摩擦模型理論,對錨桿支護結構的應力場、位移場的變化律進行了研究,分析了加錨支護對隧洞圍巖應力、變形的影響。
  2. The paper gave some methods for calculating the area of anomalistic area on plane, and then deduced the methods for calculating coordinates points and counting grids, and finally the paper gave another method of counting pixels

    介紹幾種求取平面不區域面積的方法,再推演出專用於算海域面積的坐標法和方格法,並給出一種適合算機算的點法。
  3. Based on the diopter status of myopia and hypermetropia, the paper presented the principle of excimer laser refractive surgery, the change of impacting cornea curvature on the cornea diopter. in this chapter, we also discussed excimer laser - corneal tissue interactions and photoablation. determine the relationship between the fluence of arf excimer laser and the cornea ablation rate, attain the relationship between the energy density and the ablation depth

    研究了激光與生物組織相互作用、光蝕作用及準分子激光消融角膜的機理;首次定量研究193nm準分子激光高斯光束的切削量與能量密度的關系,算單個激光脈沖角膜切削量;發現了角膜曲率對切削效果的影響,首次提出了角膜曲率半徑、切削位置與切削深度的關系;首次定量確定了激光光斑參及其排列方式對術后角膜表面粗糙度的影響,為更精確實現角膜切削和提高切削后角膜表面光潔度、減少手術后角膜渾濁及角膜表面術后不提供了理論依據。
  4. In order to maintain the rules conveniently, we make use of the technology of rdbms in managing data, consider the trait of production rules, and then design and realize the arithmetic to check the rules " equipollence and circulation on the basis of our former work - knowledge ordering. all these solve the knowledge base ' s consistency effectively

    為了方便對的維護,我們充分利用據庫管理系統對據管理的巨大威力,結合產生式知識的特點,在原有知識序化的基礎上,對的等價、循環做了演算法設與實現,較好地解決了知識庫的一致性問題。
  5. At the submicroscopic level a gas appears to be an incalculable chaos of flying molecules.

    從亞微觀的觀點來看,氣體是一群不的、無亂飛的分子。
  6. There are many problems happened when international phonetic alphabet symbols are used in word - processing like nonstandard application, nonstandard encoding which cause a limitation on sharing and communication of datain teaching and research, for instance ; international phonetic alphabet and symbols contained in ones document cannot be accurately displayed when they are removed to another computer. there appears many nonstandard usage, unnecessary characters, symbols, rules, as well as some wrongly written letters which often delay publication of the papers

    不僅應用上不范,也不符合相關編碼標準,因而語言文字應用教學和研究相關據的共享與交流等受到極大的限制。例如:某人采寫的文檔離開了作者的算機就不能正確顯示或不能顯示國際音標字母和符號。還有以先定義后使用的形式出現了很多不范的用例,甚至還「誕生」了一些不必要的字元和
  7. In this paper, we study focus on building intrusion detection model based the technique of data mining ( dm ). firstly, the paper designed a scheme to modeling intrusion detection based dm and bright forward the idea of descriptive model and classified model to intrusion detection. secondly, we designed and implemented a net data collection system with high performance and a scheme to pretreat net data. thirdly, after studying the algorithms to mine association rule and sequence rule in net data, we extended and improved the algorithms according to the characteristic of net data and the field knowledge of intrusion detection

    首先設了基於據挖掘技術的入侵檢測建模方案,提出使用該技術建立入侵檢測描述性模型和分類模型的思想,並用分類判決樹建立了入侵檢測分類模型;其次,設和實現了一個高性能的網路據採集系統和網路據預處理的方案;然後,在對關聯挖掘和序列挖掘演算法進行研究的基礎上,結合網路據的特性和入侵檢測領域的知識對演算法進行了擴展和改進,挖掘出了網路據的關聯模式和序列模式;最後,研究了描述性模式的應用,並設出基於模式匹配的入侵檢測引擎,該引擎具有誤用檢測和異常檢測功能。
  8. Similarily, according to the dsp data access pattern and design philosophy of md32, a data memory combined data cache and data rani is proposed. in the md32 rtos, memory management system is one the most important part

    同時,針對dsp中據訪問的特點和md32同時兼顧dsp與risc特性的設特點,設了包含據ram和據cache的據存儲系統,並對給出了據存儲系統的訪問
  9. The myth states that the unknown architect, then in his thirties, submitted rough sketches to the competition judges, that he ignored most of the rules, that his design was only selected after being plucked at the last moment from the reject pile by one of the judges, and that the design was unbuildable

    傳聞說,這位名不見經傳的建築師向評委會遞交設方案時只有30來歲;他對大多都置之不理;他的設方案是最後一刻一位評委從淘汰的紙堆中抽出來的,否他的設根本無法變成現實等等。
  10. It adopts the hierachical clustering in vocabulary vsm model because of its special function, on the other hand enriches the subcategory tagging information by rules, it can decrease me data sparse problem, and introduces the confidence intervals into the model for the selection of priority between statistics and rules

    另外還對標注模型從兩方面作了優化,由於詞匯特徵向量的特殊作用,本文對特徵詞匯採用層次聚類來提高其分類精度;另一方面,引入來進一步豐富細分類標注信息,減少據稀疏等問題,並且引入置信度來選擇統的優先關系。
  11. Comparing with the model test data the result of the calculation is more close to that from the formula in " design and calculation standard for submarine structure ( gjb ) "

    與實驗據進行比較,其算結果比利用gjb 《潛艇結構設》的算結果更接近於真實值。
  12. The using rules about the fatigue strength in " design and calculation standard for submarine structure " is worked out according to the standard that the ultimate time of submergence is less than 500

    現行的「潛艇結構設」中關于疲勞強度的設,是按照極限下潛次不超過500次的標準進行校核。
  13. These are employed for constructing and configuring fuzzy neural network, where the number of neurons of hidden layer of network is equated to the number of rules and the initial weights of network are configured by above factors

    首先利用粗糙集理論對樣本據進行初步獲取,並的依賴度和條件覆蓋度,然後根據這些進行網路設,其中,網路隱層節點的目等於目,初始網路權重由的依賴度和條件覆蓋度確定,最後用遺傳演算法對模糊神經網路參進行優化。
  14. Based on the techniques of main memory database, we have designed and realized the rule subsystem, the rule expression, rule memory structure, rule trigger mechanism, rule execution mechanism, events detection mechanism, transaction analyzing and conversion mechanism from the rule to statement so as to implement the active function of the system. we also discuss cascade trigger, rule termination of the active rule set

    在改進的nhdb ~ *子系統中,實現了nhdb ~ *的形式化定義、設的存貯結構,研究了nhdb ~ *觸發機制、事件檢測機制、的執行機制、事務處理機制等,從而使得nhdb ~ *系統具有相應的主動功能,實現nhdb ~ *主動據庫的主動行為。
  15. The scoring rule which gives the most points will always be used. all scoring results will be rounded to 2 decimal places

    是按照最多的常用點(這句不太清楚什麼意思,不確切) ,所有成績精確到小點后2位。
  16. The number that is raised to various powers to generate the principal counting units of a number system

    乘方被提升到各種乘方上,產生字系統內基本
  17. Dkow is capable of modeling and reasoning static domain knowledge, including domain structures, concepts and properties of the concepts, and the relations among concepts, etc. in order to apply the power of domain ontology to express the semantic information of web data, the author presents an algorithm named dtd generating from domain ontology ( dtdgdo ) that maps a given ontology to a document type definition ( dtd ) based on the transformation rules

    作者提出了一種基於領域本體的web據語義信息的表示方法,設了dkow構建的形式化領域本體到相應dtd的生成演算法dtdgdo 。作者在屬性定義方面增強了現有ecfgs方法對dtd模型的定義,設了生成演算法dtdgdo的三類轉換:重組、變換、基
  18. From the reductions of decision table defined by history fault data, a series of nodes network rule sets, with suitable belief degree under different reductive levels, is developed by calculating the rough subjection degree of every rule

    該方法從歷史故障據所形成決策表的約簡出發,通過的粗糙隸屬度,形成不同簡化層次上符合置信度要求的節點網路集。
  19. However, there are a few rules that can help you achieve a sound database design

    不過,有幾個可幫助獲得合理的據庫設
  20. His canon of logarithms begins : “ seeing there is nothing that is so troublesome to mathematical practice, nor doth more molest and hinder calculators, than the multiplications, divisions, square and cubical extractions of great numbers, which besides the tedious expense of time are for the most part subject to many slippery errors, i began therefore to consider in my mind by what certain and ready art i might remove those hindrances

    他的對一開始是這麼寫的:龐大字的乘法、除法、平方和立方的學方法十分麻煩,算起來又相當繁雜,不僅花費大量時間,而且非常容易發生錯誤,於是我開始構思有什麼方法可以解決問題。
分享友人