集合函式 的英文怎麼說

中文拼音 [hánshì]
集合函式 英文
set function
  • : gatherassemblecollect
  • : 合量詞(容量單位) ge, a unit of dry measure for grain (=1 decilitre)
  • : 名詞1. [書面語] (匣; 封套) case; envelope 2. (信件) letter 3. (姓氏) a surname
  • : 名詞1 (樣式) type; style 2 (格式) pattern; form 3 (儀式; 典禮) ceremony; ritual 4 (自然科...
  • 集合 : 1 (聚集) gather; assemble; muster; call together 2 [數學] [自動化] [計算機] assemblage; set; co...
  1. In this text, we first do some research on the genetic algorithm about clustering, discuss about the way of coding and the construction of fitness function, analyze the influence that different genetic manipulation do to the effect of cluster algorithm. then analyze and research on the way that select the initial value in the k - means algorithm, we propose a mix clustering algorithm to improve the k - means algorithm by using genetic algorithm. first we use k - learning genetic algorithm to identify the number of the clusters, then use the clustering result of the genetic clustering algorithm as the initial cluster center of k - means clustering. these two steps are finished based on small database which equably sampling from the whole database, now we have known the number of the clusters and initial cluster center, finally we use k - means algorithm to finish the clustering on the whole database. because genetic algorithm search for the best solution by simulating the process of evolution, the most distinct trait of the algorithm is connotative parallelism and the ability to take advantage of the global information, so the algorithm take on strong steadiness, avoid getting into the local

    本文首先對聚類分析的遺傳演算法進行了研究,討論了聚類問題的編碼方和適應度數的構造方案與計算方法,分析了不同遺傳操作對聚類演算法的性能和聚類效果的影響意義。然後對k - means演算法中初值的選取方法進行了分析和研究,提出了一種基於遺傳演算法的k - means聚類改進(混聚類演算法) ,在基於均勻采樣的小樣本上用k值學習遺傳演算法確定聚類數k ,用遺傳聚類演算法的聚類結果作為k - means聚類的初始聚類中心,最後在已知初始聚類數和初始聚類中心的情況下用k - means演算法對完整數據進行聚類。由於遺傳演算法是一種通過模擬自然進化過程搜索最優解的方法,其顯著特點是隱含并行性和對全局信息的有效利用的能力,所以新的改進演算法具有較強的穩健性,可避免陷入局部最優,大大提高聚類效果。
  2. Based on the theory of safety evaluation and risk assessment, this paper first ascertained the evaluating indices affecting ships ' seaworthiness and classified them according to their importance degrees by experts investigation, and used judgment matrix method to calculate weight of the evaluating indices, and then got the membership function by fuzzy collection theory, and finally established the mathematical model to realize a fuzzy comprehensive evaluation to ships ' seaworthiness

    摘要根據安全評價理論、風險評估理論,通過專家調查方確定影響船舶適航性的評價指標並按照重要程度進行分類,然後採用判斷矩陣法計算評價指標的權重,運用模糊理論確定隸屬數,進而建立數學模型,實現對船舶適航性的模糊綜評價。
  3. Execution of an object creation expression that includes an object or collection initializer consists of first invoking the instance constructor and then performing the member or element initializations specified by the object or collection initializer

    對象建立表達的執行包括某個對象或構造者,並由第一個調用實例構造數組成,並且,接著執行成員或元素初始化,這是由對象或構造者特定化的。
  4. With the review of digital image properties and continued fractions theory, this dissertation focuses on the study of the image interpolation and image reconstruction ; the main contributions are as fallows : first of all, the methods of solving the problem of inverse difference being infinite are successfully found while constructing the thiele - type continued fractions. in this case it is proposed to reorder the set of interpolating points and then construct a thiele - newton blending continued fraction

    本文的主要工作可歸納如下:首先,在以圖像像素為插值節點,構造連分插值數過程中出現逆差商為無窮大的情況,給出了理的解決辦法,提出了重新調整插值節點的節點順序、構造thiele - newton型混有理的插值方法。
  5. Gets the collection of chained constructor arguments

    獲取鏈構造數參數的
  6. In this thesis, we follow the idea of the beamlet - domain wave field extrapolation methods to construct localized propagators. through comparative study of signal decomposition efficiency using different representation schemes, we select two groups of basic functions with simple expressions and good localization properties for wave field decomposition, propagation and imaging

    本論文通過對wft 、小波基、小波包,以及相關的框架理論等的分析比較,選擇了兩組形簡單,且具有適宜於波場外推特性的基本來進行波場分解、傳播及偏移成像問題的研究。
  7. Functions to get a file ' s attributes, get created / last modified times, to read / write files as a single string chunk, get a directory structure as a collection, check if a file exists, and collect the shortpath

    這個數可用來獲得一個文件的屬性,獲得文件創建/最新更新時間,用來讀取/編寫文件作為一個單一的串知識塊,獲得一個目錄結構作為一個,檢驗一個文件是否存在,並收快捷方
  8. File handling module - functions to get a file ' s attributes, get created / last modified times, to read / write files as a single string chunk, get a directory structure as a collection, check if a file exists, and collect the shortpath

    這個數可用來獲得一個文件的屬性,獲得文件創建/最新更新時間,用來讀取/編寫文件作為一個單一的串知識塊,獲得一個目錄結構作為一個,檢驗一個文件是否存在,並收快捷方
  9. The main contributions of the second part of this dissertation are focused on the cryptographic properties of logical functions over finite field, with the help of the properties of trace functions, and that of p - polynomials, as well as the permutation theory over finite field : the new definition of chrestenson linear spectrum is given and the relation between the new chrestenson linear spectrum and the chrestenson cyclic spectrum is presented, followed by the inverse formula of logical function over finite field ; the distribution for linear structures of the logical functions over finite field is discussed and the complete construction of logical functions taking on all vectors as linear structures is suggested, which leads to the conception of the extended affine functions over finite field, whose cryptographic properties is similar to that of the affine functions over field gf ( 2 ) and prime field fp ; the relationship between the degeneration of logical functions and the linear structures, the degeneration of logical functions and the support of chrestenson spectrum, as well as the relation between the nonlinearity and the linear structures are discussed ; using the relation of the logical functions over finite field and the vector logical functions over its prime field, we reveal the relationship between the perfect nonlinear functions over finite field and the vector generalized bent functions over its prime field ; the existence or not of the perfect nonlinear functions with any variables over any finite fields is offered, and some methods are proposed to construct the perfect nonlinear functions by using the balanced p - polynomials over finite field

    重新定義了有限域上邏輯數的chrestenson線性譜,考察了新定義的chrestenson線性譜和原來的chrestenson循環譜的關系,並利用一組對偶基給出了有限域上邏輯數的反演公;給出了有限域上隨機變量聯分佈的分解,並利用隨機變量聯分佈的分解對有限域上邏輯數的密碼性質進行了研究;給出了有限域上邏輯數與相應素域上向量邏輯數的關系,探討了它們之間密碼性質的聯系,如平衡性,相關免疫性,擴散性,線性結構以及非線性度等;討論了有限域上邏輯數各類線性結構之間的關系,並給出了任意點都是線性結構的邏輯數的全部構造,由此引出了有限域上的「泛仿射數」的概念;考察了有限域上邏輯數的退化性與線性結構的關系、退化性與chrestenson譜支的關系;給出了有限域邏輯數非線性度的定義,利用有限域上邏輯數的非線性度與相應素域上向量邏輯數非線性度的關系,考察了有限域上邏輯數的非線性度與線性結構的關系;利用有限域上邏輯數與相信息工程大學博士學位論文應素域上向量邏輯數的關系,揭示了有限域上的廣義bent數與相應素域上的廣義bent數的關系,以及有限域上的完全非線性數與相應素域上向量廣義bent數之間的關系;給出了任意有限域上任意。
  10. ( 3 ) study deeply the structure of fat 16 file system and the characteristic of flash disk, and develop the file management software of flash disk to manage nc files effectively according to the management idea of fat 16 file system. ( 4 ) research the module and protocol of reliable communication in serial network, which are composed of arm main control board, dsp motion control board, keyboard board, i / o control board and encoder signal collection board, and then develop communication software of the serial network. ( 5 ) study the principle of displaying char in lcd and the method of embedding font library into operating system, and research deeply the method of embedding chinese font library into os in the light of the characteristic of chinese

    本論文的主要研究內容如下: ( 1 )研究uc os -實時嵌入操作系統在硬體平臺上的移植及其佔先內核的任務調度原理,理分割銑床控制系統的管理任務,根據任務的要求賦予不同的優先級和調度時間,保證任務的執行效率和實時性; ( 2 )開發底層設備驅動程序和應用程序介面( api )數,以便於進行系統應用軟體的開發; ( 3 )深入研究fat16文件系統的結構和固態盤的硬體特性,參照fat16文件系統的管理思路,開發固態盤文件管理軟體以有效管理nc代碼文件; ( 4 )深入研究由arm主控板、鍵盤板、 i o控制板、編碼器信號採板等裝置組成的串口通訊網路可靠通信的模型及其通訊協議,開發串口通訊網路通信軟體; ( 5 )研究字元的顯示原理和在操作系統中嵌入字庫的方法,在此基礎上結漢字的特性深入研究中文字庫的嵌入方法,開發中文字庫嵌入軟體,滿足開發操作界面的信息要求; ( 6 )深入研究三維圖形坐標變換的原理,開發實用的三維加工軌跡顯示軟體,便於操作者對零件的加工過程進行監控和診斷。
  11. Fuzzy sets describing the safety of the arc region are constructed with a cost funtion to genenrate a local path statifying kinematic constraint of the mobile robot

    在此基礎上引入了對區域安全性的模糊子描述,建立了代價數,得到了符車運動學特點的局部路徑。
  12. The engendering source of traffic volumes and their general influential factors have been presented, and the situation of nowadays highway transportation has been discussed. according to the introduction of traffic distribution theory and classical assignment method, analysis of traffic flow path selection among cities and that of special influential factors for traffic flow on toll highways, initial analysis to the forming mechanism of traffic volume on road sections has been made, and a probability model for path selection has been set up with the maximum - utility theory and disaggregating model. detailed analysis to impedances on road sections and their functions ( especially to three main composing factors of the impedances as cost of time, transport and toll and to the functional relations with traffic loads ) was made, at the same time, the relative cost calculating model was set up on the basis of the state - of - art achievements in both international and national researches

    主要研究內容包括:交通量的產生根源及一般影響因素分析和當前公路運輸地位討論;從交通分配理論及經典配流方法著手,通過分析城市間交通流路徑選擇行為和收費公路路段交通量特殊影響因素,初步提出路段交通量的形成機理,並採用效用極大原理和非結模型理論( disaggregationmodel ) ,建立用戶出行路徑選擇概率模型;對路段阻抗及路阻數(尤其對行程時間費用、車輛營運費用和道路收費這三個構成路段阻抗的主要因素及其與交通負荷間的數關系)進行較為詳盡的分析,並以現階段國內外較為先進的研究成果為依據建立相應的成本測算模型,其中,特別提出了兩種確定客貨車輛時間價值的分析方法;離散分析法和時間-費率轉換法,後者是在目前基礎調查、統計數據資料不夠齊全的現實下提出的一種確定道路系統內務車型時間價值的較為實用的新方法;對我國公路收費政策的背景和理論、實踐依據及費率的各種影響因素進行重點分析;從數學的角度證明理費率的存在性,並以最優化理論為基礎,建立在普通收費公路和擁擠路段交通調控型收費公路兩種模理費率的計算模型等。
  13. The model can be made into difference equation of the temperature field that can be used to simulate calculation ; then we can get the set of edge point, and we can have the function of the fire line, and we can also have the burned area, the length of fire line and the space of fire area ; it also come to the conclusion that the main factor of forest fire is convection heat transfer

    經差分處理,得到進行模擬計算的一組溫度場計算方程;由邊界點條件,求出邊界點的后,擬得出火線數,積分后可得到時刻火場的過火總面積、火線長度和火場形狀,同時進一步證實了對流傳熱方是影響林火蔓延的主要因素。
  14. In the analysis process, the six main peaks in 88 - 100 kev region, including the y peaks of 234th, the k peaks of th and the k peaks of u, are chosen. the smoothly joined gaussian function and low energy exponential tail is taken as peak shape function and quadratic polynomial is taken as background function. the two functions are fitted to gether to calculate the peak area

    在分析過程中,選擇了88 - 100kev能區的~ ( 234 ) th的射線峰, th的k _射線峰以及u的k _射線峰共六個主要能峰,通過採用高斯數和低能指數尾部光滑聯接的峰形數和二次多項本底數一起擬,來求出峰面積;而該能區所有能峰的探測效率可以認為是近似相等的,由此得到鈾富度。
  15. To assure astringency, some technologies have been used such as iterative penality function methods, assemblage mass matrix, reduced integration algoritlun, newton iteration method with parameters for non - linear equation set, introducing relax factors and double steps solution and so on, and an algorithin for solving the nonlinear equation set of flow field by fem has been presented

    基於有限元法建立了流場求解列,為保證其收斂性,採用了迭代罰數法,中質量矩陣,縮減積分計算,帶參數的newton迭代求解,引入松馳因子及雙層解法等技術,提出了一套適流場有限元方程計算的非線性方程求解方法。
  16. Compared with csm, two examples proved that ann could be trained successfully, even if the available data were insufficient and irregular, while csm showed the limit in selecting model type and non - linear optimization

    兩個實例的應用結果表明:人工神經網路通過神經原作用數的簡單復就能逼近有限子的任意非線性數,而傳統的統計方法則存在著如何選擇模型形及非線性優化問題,表現出明顯的局限性,並且統計模型的更新工作相當繁重。
  17. According to the results of the experiment, the paper discusses the question that it takes too much time in the finding reduct when this kind of the algorithm is used in the data set without core. an adaptive model horafa - a is constructed with the heuristic optimal reduct finding algorithm presented in the paper

    同時根據實驗討論了該類演算法對于無核數據所存在的需要大量時間求約簡的問題,在這個問題的探討中,本文結上述利用屬性頻率數的啟發約簡演算法提出了一個可以實現演算法自適應的模型? ? horafa ? a 。
  18. First of all we discuss the model of information purifying and bring forward the methods of setting up the according fuzzy set and subject function. secondly after analyzing the traditional technology and the strongpoint and the shortcoing of information purifying we improve it combining with the technique of fuzzy mode identifying, data warehouse, cache etc. and we can perpetrate an on - line and synchronous purifying through analyzing the text and picture showing in the pages of network. finally, we choose sql server 2000 to design the url database and delphi, wingate as the tool for system development to develop an efficient system of information purifying which can keep the network consumer especially young student apart from the intrusion of unfriendly information and make the environment of network pure and fine

    本文首先探討了該系統中的信息「凈化」模型,提出了模型中的模糊及隸屬數的構造方法;然後分析了傳統的信息「凈化」技術及其優缺點,結模糊模識別、數據倉庫、高速緩存等技術對傳統的信息「凈化」技術進行了改進,改進后的信息「凈化」技術可通過分析正在顯示中的網頁文字、圖片內容,做即時、同步性的網頁內容篩選;最後,利用sqlserver2000設計了url數據庫,選擇delphi 、 wingate作為系統開發工摘要具,設計開發了一種高效的網路「凈化」器,使網路用戶尤其是青少年學生遠離非友善信息的侵擾,讓網路環境更加純凈、美好。
  19. The grouping function returns 1 when an expression evaluates to null, because the column value is null and represents the set of all values

    表達取值為null時, grouping數返回值1 ,因為該列值是null且表示所有值的
  20. You can replace or revise the expression or paste in functions, operators, constants, fields, parameters, and items from the global collections

    您可以替換或修改表達,或者粘貼數、運算符、常量、欄位、參數和全局中的項。
分享友人