隨機模式 的英文怎麼說

中文拼音 [suíshì]
隨機模式 英文
random model
  • : Ⅰ動詞1 (跟; 跟隨) follow 2 (順從) comply with; adapt to 3 (任憑; 由著) let (sb do as he li...
  • : machineengine
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 隨機 : random stochasticrandom
  • 模式 : model; mode; pattern; type; schema
  1. The competition among those species like s. tsinyunensis, dryopteris erythrosora and veronicastrum stenostachyum etc., is intense in the communities, which may be one of the reasons why s. tsinyunensis is going to be endangered and with a very restricted distribution. the distribution patterns of the seven populations of s. tsinyunensis are clumped among the eight populations we studied, except population v of random distribution. the spatial pattern of 6 populations of s. tsinyunensis have high consistency with the negative binominal distribution, while another 2 populations, i. e., i and iii are poisson distributions

    6 )縉雲黃芩各種群空間分佈格局基本呈聚集分佈,其中7個種群的分佈格局類型是聚集分佈,其聚集強度較高,另有一個種群為分佈;其種群的離散分佈擬合結果也嚴格符合一定的數學,其中負二項分佈、 poisson分佈分別是該物種種群空間分佈的理論分佈,其中6個種群擬合出的結果是負二項分佈,種群i和種群m擬合出的結果是poisson分佈。
  2. Then the author focus on schemes including identification, digital signature and deniable authentication, and several classical algorithms are addressed as well. in addition, we analyze the differences between standard security paradigm and random oracle paradigm. based on all above, by using elliptic curve, we establish a new identification scheme and its corresponding digital signature scheme under random paradigm

    文章詳細的分析了認證系統的三種類型,即身份認證、數字簽名和消息認證,剖析了一些經典的方案,並對標準安全oracle做出比較,並基於oracle提出了一個新的身份認證演算法及其相應的數字簽名變形,兩個演算法均在橢圓曲線上實現。
  3. Stochastic network model for disassembly of discarded products

    裝配產品拆卸的網路型研究
  4. At first, this paper analyzes the factors of water - sand influencing water level of yellow river and the feasibility just using the factors of water - sand to study water level, and collects the corresponding data ; secondly, because there are strong nonlinear relation in the corresponding data, by meticulous theory analysis, this paper integrates basic nonlinear analysis method, theory of random analysis, method of least squares and so on. it puts forward a method which can get the high accuracy simulation of the data, perfects the multi - factor analysis of variable ( over three factors ) of the statistic ; thirdly, it applies the method to the approximation of corresponding water level process which belong to the capacity of sand of middle - high and middle - low, and get the high - accuracy simulation about the typical nonlinear relation ; at last, this paper definitudes the main influence mode that the capacity of sand. it mainly unite with other factors to work on the water level in the yellow river lower reaches ; mor eover, this paper analyzes the difficult point and the direction of improvement to realize the accuracy forecasting of the flood level of erodible - bed channel

    首先,系統分析了影響黃河水位的水沙因素,及僅用水沙因素有效研究水位的可行性,並按變量對應思想採集它們的相應數據;其次,由於相應水位過程數據中含極強的非線性關系,本論文經細致的理論分析,將基本的非線性分析方法、統計建方法、分析理論、最小均方誤差原則等等數學理論及方法有揉合,提出了能有效實現這類數據高精度擬合的分層篩選法,並改進了統計學中多因子(三個以上)方差分析法;再次,將這一方法用於黃河中高及中低含沙類洪水相應水位過程的擬合,實現了這一典型非線性關系的高精度擬合,各年汛期上下游相應洪水位過程的擬合誤差都較小;最後,明確黃河下游含沙量對水位的主要影響方,即含沙量主要是與其它因素聯合對水位作用;另外分析了要實現變動河床洪水位過程準確預報的困難所在及改進方向。
  5. On the basis of introducing the principle of the tf / ar radar, this paper analyzes the conditions of effectively jamming the tf / ar radar in typical tactical act of hedgehopping, which include the disposition and quantity of electron reconnaissance / jammer, calculates the capability request of equipments in the method of sensor / hand - emplaced jammer, and concludes that it is difficult to jam tf / ar radar at the present time

    摘要在介紹地形跟迴避雷達工作原理的基礎上,通過設定典型超低空突防飛的戰術行動,分析了對雷達實施有效干擾所必須具備的條件,包括偵察干擾的部署、數量要求等;並計算了在傳感器擺放(投擲)干擾下對裝備的性能要求,得出了在目前技術條件下,對地形跟迴避雷達實施干擾在技術和戰術上都是困難的。
  6. The first one : fitting together ultimate values of every dimensions in one dimension - chain one by one, educing many equations by itself, calculating results, and comparing these results of close dimension to find maximal and minimal values. the second one : projecting all dimensions on two preestablished axis, then providing the solutions to analyze whether every projected dimensions is increscent or decreasing, and synthesize the effect of every projected dimensions to close dimension, educing many equations by itself, at last calculating the result of close dimension. the third one : according to monte carlo analysis, getting every dimensions " values from every dimensions " tolerances at random time after time, simulating the actual circumstances of mass production using these dimensions, and calculating reasonable results of close dimension economically

    鑒于這類系統在各大中小型企業的廣泛應用與相對滯后的研究水平,本文提出了三種新的能切實地解決目前尺寸鏈計算輔助分析解算中存在的各種難題的設計方案,第一種方案將尺寸鏈中各組成環能取的極值組合起來,自動列方程組,求解每個組合情況下的封閉環尺寸,最後比較這些結果,得出封閉環的最大最小值;第二種方案將尺寸鏈各組成環向預先設定好的兩個方向投影,之後再分析各尺寸環投影分量的增減性,並且提供了組成環兩個方向上的投影分量增減性不一的復雜情況下的解決辦法,綜合組成環各投影分量的增減性,然後自動列出方程組,最後根據各組成環的投影分量以及所列的方程組來確定尺寸鏈封閉環的尺寸;第三種方案以蒙特卡洛法為原理,在尺寸鏈各組成環的取值范圍內使用計算產生大量數,擬實際大批量生產中的零件尺寸分佈情況,以更經濟更合理的方分析、計算封閉環尺寸。
  7. Based on chaos circuit, this paper discusses two application modes, random rectangle wave oscillator and chaotic inflator and introduces intensively methods and their results of computer

    基於混沌電路,論述了兩種應用方矩形波發生器和混沌振動器,並詳細介紹了計算擬方法和結果。
  8. With the ways of our countrys criminal litigation court trials changing from inquisitorial proceedings to adversary procedures and the progressing of the criminal jurisdiction reformation, discovery is becoming an unavoidable issue in criminal litigation in our country. in practice, many jurisdictional authorities in our country have tried to explore and try it since 1999. this article, through comparing the discovery system among britain, america and japan, through analyzing the present actual situation of our countrys criminal litigation and from the aspects of the litigation modes, jurisdiction justice and the necessity for deepening the reformation of criminal trials, has proved that it is necessary and emergent in practice and applicable in theory to establish the discovery regime in our country

    著我國刑事訴訟法庭審判方由審問制向對抗制的轉變和刑事審判方改革的進一步深化,證據展示便成為刑事訴訟中的一個不可迴避的問題,實踐中不少司法關從1999年始即已進行了證據展示的探索和嘗試,本文從英美日國家的證據展示制度的規定和比較入手,通過對我國刑事訴訟運作現狀的分析,從刑事訴訟、訴訟公正價值觀和深化刑事審判方改革的角度,論證了證據展示制度在我國的建立具有現實上的必要性、緊迫性和理論上的合理性,並在此基礎上對證據展示的主體、責任、內容作了理論上的探討研究。
  9. Institutional investor is a market part who is developping and extending, with the expanding of it ' s scale, it wil become from shareholder negativism to institutional shareholder activism, however, between the institutional investors, another problem exists, that is, who is responsible for supervision, a cock game model which describes the supervision of institutional investors is used in this chapter to inspect the institutional investors " behaviour mode in the situation of supervising cost and return is not symmetric

    構投資者是一個正在發展和壯大的主體,著其規的擴大,會從早先的股東消極主義發展到股東積極主義,但是,構投資者之間也存在誰去監督的問題,為此,本章採用了一個構投資者監督侵權行為的斗雞博弈型,來考察監督的成本和收益的不對稱情況下的構投資者行為
  10. The main achievements are as follows : it is verified that there is an unique mean square solution to the stochastic surge model ; the formulas for probability density function of head loss and the maximum relative surge level were deduced ; the joint probability density function for solving surge process and the mean head process of simple hydraulic system were also derived

    主要研究成果有:證明了調壓室涌浪型存在唯一的均方解;推導出了水頭損失和最大相對涌浪值的密度函數計算公;求解了調壓室涌浪解過程的聯合密度函數和簡單水力系統的水頭均值過程等。
  11. For purpose of the characteristic of open - up fund, this article proposes three asset management methods, furthermore it also talk about the investment strategy of open - up fund under the environment of china security market

    本文針對開放基金的特點,從風險和收益平衡的角度提出了其資產管理可採用的三種方法:贖回比率法,隨機模式法和持有人清單法,並進一步闡述了現實我國證券市場制度環境下開放基金的運作策略。
  12. Another 20 kinds of non - designed contact points are given for the first time. contact determining algorithm of all the above contact types is given using z - buffer algorithm for 3 - d observation, and simulation results show high accordance with results of vector - associated method. simulation for non - designed contact mode with random initial conditions has been done too, and statistics from the simulation indicates that it is important to predict non - designed contact points in practical rvd efforts

    全文的工作包括以下幾個方面的內容: 1 .建立了周邊對接構的復雜幾何外形的數學描述,描述了對接初始條件范圍內,兩對接構相互接近、捕獲過程中可能出現的20種設計接觸,並針對初始接觸點首次提出20種非設計接觸;利用計算圖形學中可見面判別的z -緩沖演算法原理,給出了所有接觸的檢測演算法,該演算法的擬結果與輔助向量法高度一致,驗證了演算法的有效性;進行了300組確定首次接觸點的擬,統計結果表明,在飛船上實時進行非設計接觸的預測是非常重要的。
  13. One is the " belt persistence ", which is defined as the total length of joints teace length in a 1m wide belt projected to a basic line ( eliminating the overlay section ) over the length of the basic line. another is the one called as " search persistence ", which is defined a as the total length of joints trace length on the searched potential slipe surface over the length of the slip surface. thus, the author establishes a measuring and calculation system to these definitions and finishes a great deal of field investigation aiming at the joints trace length and the " rock bridge " survey

    在此基礎上,針對a區邊坡的穩定性,結合邊坡的破壞失穩,以邊坡節理巖體的連通特性的研究為突破點,從節理巖體的幾何參數的統計分析出發,採用monte - carlo擬原理形成節理網路擬圖,以巖橋和節理組合破壞的內在制為依據,以搜索節理巖橋組合的最短路徑為手段,通過帶寬投影法與路徑搜索法兩種方法的計算,獲得了sn向中緩節理的連通率分別為48 . 7和56 . 78 ,最終推薦60的連通率進行了邊坡的穩定性分析與計算,並結合工程實際,計算了邊坡的推力與錨固力,最終為邊坡的支護設計提供優化建議。
  14. And the unbelievable increase happened in the filed of derivatives, the issued financial derivatives in 1996 is totally around 3. 5 trillion u. s. dollars, and among these transactions, about 2. 5 trillion u. s. dollars was otc, and the rest was happened in the official exchange

    Vasicek根據vasicek型推導出零息債券的平均價格,奧托在其1998年的論文中用統計物理學中的路徑積分方法重新推導了基於vasicek型的零息債券平均價格的定價公,並得到了相同的結論。
  15. Correlation characteristic of chaotic sequences have been studied. it demonstrate that chaotic sequences have the same characteristics as chaotic signal. replaced the random signals with chaotic signals, all kinds chaotic switching modulation mode can be obtained

    將著名「蔡氏電路」產生的混沌開關調制信號用於buck型dc dc變換器開關的調制控制,使其工作在基於混沌的隨機模式
  16. There is only such report on the idi diesel engine by foreign countries according to my materials. 4. firstly finished the improved curl model and combined with the turbulent model to set up a spray and combustive stochastic model of di diesel engine, using monte carlo method to simulate it

    針對直噴柴油的特點,在國內首次完成了利用改進的curl碰撞?離散型,並結合湍流型建立了直噴柴油噴霧和燃燒的型,並利用montecarlo法進行數值求解。
  17. Along with the rapid development of computer technology and internet, computer system has been shifted from independent mode of computer to an open internet. the problems of network and information security are emerging increasingly. different kinds of attacking incidents on the internet keep on happening

    著計算技術和internet的飛速發展,計算系統已經由獨立的單轉向開放、互聯的網路環境,網路安全和信息安全問題日益突出,網路上各種攻擊事件不斷發生,相應地各種安全措施也越來越多。
  18. Then the model is simplified, the theory of martingale, simulation, and diffusion approximations are discussed firstly. these methods are applied in the model. then get some useful results, so we can estimate the upper bound for the ruin probability and the approximation of the finite time ruin probability

    並詳細的討論了型有限時間內破產概率和最終破產概率的估計,應用過程序列弱收斂,鞅以及擬等理論,得出一些有意義的結果? ?在有限時間內破產概率的逼近表達;最終破產概率的上界和有限時間內破產概率上界;有限時間內破產概率的擬演算法;並得到最終破產概率滿足的泛函方程。
  19. Part ii describes algorithmic aspects of speech recognition systems including pattern classification, search algorithms, stochastic modelling, and language modelling techniques

    第二部分講述語音識別系統中的有關演算法,包括分類,查找演算法,型,語言型等技術。
  20. In this paper, a random model based decision tree algorithm was applied, and an intrusion detection model based on it was provided

    採用了一種基於型的決策樹演算法,在保證分類準確率的基礎上,減少了對系統資源的佔用,並設計了基於此演算法的分散入侵檢測型。
分享友人