隱式計算 的英文怎麼說

中文拼音 [yǐnshìsuàn]
隱式計算 英文
implicit computation
  • : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
  • : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
  • 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
  1. In this thesis, used thermocouple to sense the temperature in the space of the hearth, attributed the thermocouple based on calorifics and scientific arithmetic, acquired data by data acquiring card, processed data according to the demand of setting up temperature model and drawing graphics and then caculated the coordinates of isothermal points and normals of isothermal facets, ascertained the order of connecting points and the model of construct, drawed the isothermal facet of temperature field with opengl at last

    通過數據採集板卡進行數據採集並與機介面進行數據處理。然後,將處理后特殊點的溫度數據依據marchingcubes演法建立數學模型求取等溫面上的點的坐標及各點的法向量等。最後,確定的三維坐標點的連接順序和拓撲模型,利用opengl進行等溫面的繪制、消和模變換等工作。
  2. Firstly, second harmonic component ratio and dead angles of two phase inrush ' s dispersion in three - phase transformes are acted as input variable. secondly, the method applies improved algorithm based on the original algorithm of multi - layer forward back propagation network, that is to say, adding last variational effect of weight value and bias value to this time and making use of variable learning rate. at the same time, this method also adopts dynamic form in the number of hidden floor node

    首先,文中將三相變壓器兩相涌流差流的二次諧波含量比和間斷角作為網路的輸入變量;其次,利用對原有bp網路訓練演法基礎上的改進型演法(即在本次權值和閾值的變化時增加上一次權值和閾值變化的影響以及採用變學習率,與此同時含層神經元個數採用動態形) ,通過樣本訓練使網路結構模型達到最優。
  3. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散多媒體會議系統,竟然未採取任何加密措施
  4. Node. select or clear enable property evaluation and other implicit function calls

    選中或清除「:始終允許屬性和其他函數調用」 。
  5. Therefore, by default, the debugger does not evaluate implicit function calls automatically

    因此,默認情況下,調試器不會自動函數調用。
  6. When evaluation of properties or implicit function calls is turned off, you can force evaluation by using the

    當關閉屬性函數調用時,可以使用
  7. The debugger cannot tell whether a property evaluation or implicit function call has side effects

    調試器無法區分是屬性還是函數調用產生副作用。
  8. This can be useful when implicit evaluation of properties and implicit function calls is turned off

    當關閉屬性的隱式計算函數調用時,這是很有用的。
  9. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審和監控、備份以及個人私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審和恢復、操作系統安全、數據庫系統安全、機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  10. Edm has some remarkable advantages over traditional models, includes using implicit causal models, self - learning capacity, weak dependence on domain knowledge, wide applicability, robustness, self - adaptability, and population - based searching, etc. tracing back its intrinsical ideas, edm is just making use of the nature ' s decision making strategy, natural selection, to solve the decision making problems faced by human or the intelligent agents

    進化決策主要利用了進化演法與形模型相結合所具備的自動建模能力,它具有因果模型、自學習、弱知識依賴、應用廣泛、穩健性、自適應和群體搜索等優勢。追根溯源,進化決策的基本思想正是利用大自然的決策機制(自然選擇)來解決客觀世界所提出的決策問題,而自然進化又是已知的能力最強的問題求解范型。
  11. In the paper, river and the downstream area of dike are regarded as a whole system, and hydraulic model of coupling 1 - d river and gradual dike - break is established, therein the preissmann implicit difference scheme is applied to main river, and the fvm ( finite volume method ) is applied to the breach and polder

    本文將河道與堤壩下游區域視為一個整體,對于單一河道採用preissmann四點差分格,對于潰口及圩區採用有限體積法,建立了一維河道與堤壩漸潰耦聯的水力模型,也是一維、二維耦合的水流模型。
  12. It was specially pointed out that, when the tail water is constant maximum tide, the computed flood surface is higher than that of nonsteady current, so there is some safety superelevation. underestimation of the roughness will make downward bias to compute along - river surface and bring hidden trouble for flood control. to improve the section can decrease the water level or offset the water rise for increase of floodplains " roughness, but it need much engineering works

    特別提出,按照恆定流出來的設水位比非恆定水位具有一定的安全儲備;而對于灘地糙率的低估又會造成設水位的偏低,給防洪工作帶來患;如果利用改進斷面形來降低水位或彌補糙率增加帶來的水位抬高,需要較大的工程量,所以平時應注意灘面的減糙管理工作。
  13. The original flow rate formula of parobolic throat flume used for u - shaped channel is implicit function and is not convenient for calculation in irrigation districts. an simplified formula is developed in this paper, with a di fference between results calculated with the original formula and the new formul a being less than 0. 5 %

    用於u形渠道量水的拋物線形喉口量水槽原流量公函數形,針對其使用不便的現狀,通過理論分析推導出了顯函數形的量水槽流量公結果與原流量公比較相對誤差值0 . 5 % 。
  14. And then, in the simulation of three - dimensional, the application of o - type grid and hybrid grid are used in two relatively complicated structures make the total amounts of grids and the time of grid generation reduced greatly. moreover the hexahedron grids are placed in most areas to provide higher precision. through the comparison between the results of two - dimensional and three - dimensional simulation, we knew two - dimensional calculating is not adequate

    本文用簡單、方便的二維模型作為數值的起點,使用耦合法以及先進的v2f湍流模型進行求解,成功地捕捉到了激波,觀察到主氣流從壁面的分離、切換、再附壁等現象,並對結果進行了細致的分析,得出一些有意義的結論;在此基礎上,本文在國內外首次對超音速射流雙穩閥的三維流場進行了
  15. Savchenko v. function representation in geometric modeling : concepts, implementation and applications. the visual computer, 1995, 11 : 429 - 446. 23 rvachev v l. geometric applications of logic algebra

    盡管相交曲線是逼近的,相關的頂點還是用超形的參數化形的,表明它們屬于函數的零集,但不會精確地位於理論上的相交曲線上。
  16. Since conventional approaches were ineffectual, theoretical analysis and calculation were applied to find out the fault area and the reasons, and the fault was eliminated without affecting the safe operation of the unit

    由於常規的消缺辦法無法奏效,通過觀察總結出含規律,並依據理論分析和公找出故障范圍和原因,在不影響機組安全運行的基礎上消除了缺陷。
  17. The oblivious polynomial evaluation protocol will be used many times in our privacy preserving naive bayesian classifier, so its efficiency is important to the solution

    健忘多項協議在保持私的樸素貝葉斯分類器協議中多次用到,因此協議的效率是一個需要關心的問題。
  18. In visual basic, you cannot declare implicit variables in the expression evaluator, but if you use an undeclared variable in the visual basic expression evaluator, an implicit variable is created automatically

    在visual basic中,無法在表達器中聲明變量,但是如果在visual basic表達器中使用未聲明的變量,將自動創建一個變量。
  19. An expression can use arguments and operands that have incompatible data types, and in that case the expression evaluator cannot perform implicit data conversion

    表達可使用數據類型不兼容的參數和操作數,在這種情況下,表達器無法執行數據轉換。
  20. In c and visual j, you can create an implicit variable by declaring it in the expression evaluator

    在c #和visual j #中,可以通過在表達器中聲明來創建變量。
分享友人