隱式計算 的英文怎麼說
中文拼音 [yǐnshìjìsuàn]
隱式計算
英文
implicit computation- 隱 : Ⅰ動詞(隱瞞; 隱藏) hide; conceal Ⅱ形容詞1 (隱藏不露) hidden from view; concealed 2 (潛伏的; ...
- 式 : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
- 計 : Ⅰ動詞1 (計算) count; compute; calculate; number 2 (設想; 打算) plan; plot Ⅱ名詞1 (測量或計算...
- 算 : Ⅰ動詞1 (計算數目) calculate; reckon; compute; figure 2 (計算進去) include; count 3 (謀劃;計...
- 計算 : 1 (求得未知數) count; compute; calculate; reckon; enumerate 2 (考慮; 籌劃) consideration; pla...
-
In this thesis, used thermocouple to sense the temperature in the space of the hearth, attributed the thermocouple based on calorifics and scientific arithmetic, acquired data by data acquiring card, processed data according to the demand of setting up temperature model and drawing graphics and then caculated the coordinates of isothermal points and normals of isothermal facets, ascertained the order of connecting points and the model of construct, drawed the isothermal facet of temperature field with opengl at last
通過數據採集板卡進行數據採集並與計算機介面進行數據處理。然後,將處理后特殊點的溫度數據依據marchingcubes演算法建立數學模型求取等溫面上的點的坐標及各點的法向量等。最後,確定計算的三維坐標點的連接順序和拓撲模型,利用opengl進行等溫面的繪制、消隱和模式變換等工作。Firstly, second harmonic component ratio and dead angles of two phase inrush ' s dispersion in three - phase transformes are acted as input variable. secondly, the method applies improved algorithm based on the original algorithm of multi - layer forward back propagation network, that is to say, adding last variational effect of weight value and bias value to this time and making use of variable learning rate. at the same time, this method also adopts dynamic form in the number of hidden floor node
首先,文中將三相變壓器兩相涌流差流的二次諧波含量比和間斷角作為網路的輸入變量;其次,利用對原有bp網路訓練演算法基礎上的改進型演算法(即在計算本次權值和閾值的變化時增加上一次權值和閾值變化的影響以及採用變學習率,與此同時隱含層神經元個數採用動態形式) ,通過樣本訓練使網路結構模型達到最優。With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data
隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸數據日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏足夠的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施Node. select or clear enable property evaluation and other implicit function calls
選中或清除「計算:始終允許屬性和其他隱式函數調用」 。Therefore, by default, the debugger does not evaluate implicit function calls automatically
因此,默認情況下,調試器不會自動計算隱式函數調用。When evaluation of properties or implicit function calls is turned off, you can force evaluation by using the
當關閉屬性計算或隱式函數調用時,可以使用The debugger cannot tell whether a property evaluation or implicit function call has side effects
調試器無法區分是屬性計算還是隱式函數調用產生副作用。This can be useful when implicit evaluation of properties and implicit function calls is turned off
當關閉屬性的隱式計算和隱式函數調用時,這是很有用的。The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application
然後,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、操作系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。最後,對事故處理和事後分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工作給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。Edm has some remarkable advantages over traditional models, includes using implicit causal models, self - learning capacity, weak dependence on domain knowledge, wide applicability, robustness, self - adaptability, and population - based searching, etc. tracing back its intrinsical ideas, edm is just making use of the nature ' s decision making strategy, natural selection, to solve the decision making problems faced by human or the intelligent agents
進化決策主要利用了進化演算法與形式化計算模型相結合所具備的自動建模能力,它具有隱式因果模型、自學習、弱知識依賴、應用廣泛、穩健性、自適應和群體搜索等優勢。追根溯源,進化決策的基本思想正是利用大自然的決策機制(自然選擇)來解決客觀世界所提出的決策問題,而自然進化又是已知的能力最強的問題求解范型。In the paper, river and the downstream area of dike are regarded as a whole system, and hydraulic model of coupling 1 - d river and gradual dike - break is established, therein the preissmann implicit difference scheme is applied to main river, and the fvm ( finite volume method ) is applied to the breach and polder
本文將河道與堤壩下游區域視為一個整體,對于單一河道採用preissmann四點隱式差分格式計算,對于潰口及圩區採用有限體積法,建立了一維河道與堤壩漸潰耦聯的水力模型,也是一維、二維耦合的水流模型。It was specially pointed out that, when the tail water is constant maximum tide, the computed flood surface is higher than that of nonsteady current, so there is some safety superelevation. underestimation of the roughness will make downward bias to compute along - river surface and bring hidden trouble for flood control. to improve the section can decrease the water level or offset the water rise for increase of floodplains " roughness, but it need much engineering works
特別提出,按照恆定流計算出來的設計水位比非恆定水位具有一定的安全儲備;而對于灘地糙率的低估又會造成設計水位的偏低,給防洪工作帶來隱患;如果利用改進斷面形式來降低水位或彌補糙率增加帶來的水位抬高,需要較大的工程量,所以平時應注意灘面的減糙管理工作。The original flow rate formula of parobolic throat flume used for u - shaped channel is implicit function and is not convenient for calculation in irrigation districts. an simplified formula is developed in this paper, with a di fference between results calculated with the original formula and the new formul a being less than 0. 5 %
用於u形渠道量水的拋物線形喉口式量水槽原流量公式為隱函數形式,針對其使用不便的現狀,通過理論分析推導出了顯函數形式的量水槽流量公式,計算結果與原流量公式比較相對誤差值0 . 5 % 。And then, in the simulation of three - dimensional, the application of o - type grid and hybrid grid are used in two relatively complicated structures make the total amounts of grids and the time of grid generation reduced greatly. moreover the hexahedron grids are placed in most areas to provide higher precision. through the comparison between the results of two - dimensional and three - dimensional simulation, we knew two - dimensional calculating is not adequate
本文用簡單、方便的二維模型作為數值計算的起點,使用耦合隱式演算法以及先進的v2f湍流模型進行求解,成功地捕捉到了激波,觀察到主氣流從壁面的分離、切換、再附壁等現象,並對計算結果進行了細致的分析,得出一些有意義的結論;在此基礎上,本文在國內外首次對超音速射流雙穩閥的三維流場進行了計算。Savchenko v. function representation in geometric modeling : concepts, implementation and applications. the visual computer, 1995, 11 : 429 - 446. 23 rvachev v l. geometric applications of logic algebra
盡管相交曲線是逼近計算的,相關的頂點還是用超形的參數化形式計算的,表明它們屬于隱函數的零集,但不會精確地位於理論上的相交曲線上。Since conventional approaches were ineffectual, theoretical analysis and calculation were applied to find out the fault area and the reasons, and the fault was eliminated without affecting the safe operation of the unit
由於常規的消缺辦法無法奏效,通過觀察總結出隱含規律,並依據理論分析和公式計算找出故障范圍和原因,在不影響機組安全運行的基礎上消除了缺陷。The oblivious polynomial evaluation protocol will be used many times in our privacy preserving naive bayesian classifier, so its efficiency is important to the solution
健忘多項式計算協議在保持隱私的樸素貝葉斯分類器協議中多次用到,因此協議的效率是一個需要關心的問題。In visual basic, you cannot declare implicit variables in the expression evaluator, but if you use an undeclared variable in the visual basic expression evaluator, an implicit variable is created automatically
在visual basic中,無法在表達式計算器中聲明隱式變量,但是如果在visual basic表達式計算器中使用未聲明的變量,將自動創建一個隱式變量。An expression can use arguments and operands that have incompatible data types, and in that case the expression evaluator cannot perform implicit data conversion
表達式可使用數據類型不兼容的參數和操作數,在這種情況下,表達式計算器無法執行隱式數據轉換。In c and visual j, you can create an implicit variable by declaring it in the expression evaluator
在c #和visual j #中,可以通過在表達式計算器中聲明來創建隱式變量。分享友人