點四分法 的英文怎麼說

中文拼音 [diǎnfēn]
點四分法 英文
point-centered quarter method
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • : Ⅰ數詞(三加一后所得) four Ⅱ名詞1 [音樂] (中國民族音樂音階上的一級) a note of the scale in gong...
  • : 分Ⅰ名詞1. (成分) component 2. (職責和權利的限度) what is within one's duty or rights Ⅱ同 「份」Ⅲ動詞[書面語] (料想) judge
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. The second section described the accounting issues brought by cyber economy environment including the impact to the accounting suppose, accounting target, the content, the means, the process of accounting checking and the impact to the accounting information system. the third section described the ideas of the innovation of cyber economy environment emphases on the accounting business process reengineering, accounting information system innovation, assets affirmance, accounting settlement under the cyber economy environment. on basis of the third section, the fourth section analyzed the cyber accounting ' s origins, developme nt, characteristic and problems occurred in the development of the cyber accounting

    本文共章,第一章論述了網路經濟環境下會計環境的變遷,析了網路經濟的產生與特,概述了電子商務及虛擬企業的特徵,並指出對企業的組織、生產、管理環境帶來的巨大變化;第二章闡述了網路經濟環境引發的會計問題,包括對會計假設、會計目標、會計核算內容、方、流程及會計信息系統的影響;第三章提出了對網路經濟環境下的會計創新的設想,重論述了網路經濟環境下的會計業務流程重組與會計信息系統的變革,網路經濟環境下的資產與會計確認,以及會計結算等方面的創新設想;在第三章討論內容的基礎上,第章具體析了網路會計的產生、發展及特,並析了網路會計發展過程中存在的主要問題,針對這些問題,提出了相應的對策。
  2. An optimization disposal algorithm of edges in generating quadrangular meshes based on non - closing cloud data is proposed

    摘要提出了一種非封閉曲面的海量空間數據邊形網格劃過程中的邊界優化處理演算
  3. Meantime, it, in the light of concerned foreign views and the brand new reseach achievement on domestic civil fraudulent contract in recent days, accompanied by utilization of some cases in contract laws, has been paid much attention to demonstrating and analying the contents of civil offense, such as, reasons, features, classifications, key components, validity, legal duties and character. this thesis is expected to be taken advantage in the fields of stud } ', prevention and related rules on civil fraudulent conducts by exploiting contracts as well as unifiable institution of civil laws. moreover, we hope to attract more scholars and legal experts who wound like to draw their concerns to the fraudulent conducts by using contracts and eventually develop our national socialism market economy in a sound way

    本文以新《合同》確定的誠實信用原則為切入,圍繞合同民事欺詐,參照國外相關觀及國內當前有關民事欺詐研究的最新成果,結合有關合同案例,就合同民事欺詐的存在原因、特類,構成要件,效力和律責任及性質等個專題進行了深入闡述和析,對利用合同進行民事欺詐的研究、預防、適用律等以及統一民典的制定均有一定的參考作用,同時也期望以此文引起學者及律專家對民事欺詐的關注和重視,推進我國社會主義市場經濟的健康發展。
  4. Firstly, we generalize and analyze the advantages and present research of elliptic curve cryptography ; secondly, we study the basic theory of the ecc ; thirdly, we illustrate the safety of the ecc and discuss the elliptic curve key agreement scheme, elliptic curve encryption scheme and elliptic curve digital signature algorithm ; fourthly, we study fast algorithms of the multiplication and inversion multiplication of the element of in the underlying finite field f2m whose characteristic is two represented by the two basis of optimal normal basis and polynomial basis. we make improvements to the fast algorithm of the polynomial basis multiplication by hankerson and base on the experiments, we describe the properties and compare the advantages of the multiplication and inversion multiplication of the elements in f2m field under optimal normal bases and polynomial basis. results concluding from the study car be used as references in the realization of the elliptic curve cryptosystem ; fifthly, we overview the current fast algorithm of point multiplication, improve the fix base point comb algorithm, advance the speed of the whole system and remark the advantages and disadvantages of the popular algorithms based upon the experimental datas ; sixthly we realize the algorithm library of elliptic curve cryptography based on the f2m. only change slightly in our algorithm library can we realize the ecdh, eces, ecdsa based onf2m of anysize ; seventhly, we realize the ecc on two secure elliptic curves, including ecdh, eces, ecdsa

    本文首先介紹並析了橢圓曲線密碼體制的優及研究現狀;其次研究了橢圓曲線密碼體制的基本理論;第三,析了橢圓曲線密碼的安全性並介紹了密鑰共享,加密,數字簽名等橢圓曲線密碼體制;第,深入研究了特徵為2的有限域f _ 2m中的元素在多項式基和最優正規基表示下的乘運算和乘逆運算的快速演算,並對hankerson等人提出的多項式基下的乘運算的快速演算作了改進,而且在實驗的基礎上不僅析研究了f _ 2m域中元素在多項式基和最優正規基表示下的乘和乘逆運算的性能,還對這兩種基表示下的f _ 2m域中元素運算效率的優劣作了比較和研究,所得的結論可供在實現橢圓曲線密碼體制時參考;第五,研究了目前流行的計算橢圓曲線標量乘的快速演算,同時改進了固定基梳形,提高了整個系統的速度,並在實驗的基礎上析研究了流行演算的優劣;第六,實現了基於f _ 2m的橢圓曲線密碼體制的演算庫,在我們的演算庫中只需稍微改變便能實現基於任意尺寸的f _ 2m上的ecdh , eces , ecdsa等橢圓曲線密碼體制;第七,實現了兩條安全橢圓曲線上的橢圓曲線密碼體制,包括ecdh , eces , ecdsa 。
  5. Being a widely utilized public ip platform, it is susceptible to security attacks of all nature, as outlined in the following areas : the open nature of the ip internet systems - increase of foreign attacks, for example dos / ddos attacks ; the current weakness of the existing operating system ' s internet protocol ; mainframe, and lack of an evaluation standard for back office systems, the inevitable problem of illegal internal access, the lack of guidelines for record keeping and post attack documentation processes, hi addition, still in existence, are managerial problems including the lack of securit y knowledge amongst the workforce and the inexistence of a complete set of security guidelines. to guarantee china telecom ' s 163 / 169 system ' s reliable functions, to protect the user ' s interests, at the same time, insuring quality service, it is necessary to adapt p2dr model as a solution to the current security issues. supported by the modern secure theory and made the secure implementation abundant project practices, this paper gives the general secure design for the chongqing public ip network using p2dr secure model

    中國電信建設的公眾ip網對我國internet的發展起著決定性作用,重慶電信163 / 169網際網路是國家骨幹網在本地的延伸,擁有7個核心節(採用cisco12012 、 2 * 2 . 5gdpt環) ,三十八個匯接節,能提供寬帶,窄帶多種接入方式的公眾ip網,現擁有近20萬用戶,佔全市網際網路用戶之三以上,作為這樣一個擁有眾多用戶,開放的ip平臺,會受到各種各樣的安全威脅,主要表現在ip網路的開放性,來自外部的攻擊增多,如dos / ddos攻擊;所使用的操作系統運行的網路協議自身的脆弱性;主機、網路設備的配置是否缺乏評估手段;不可避免的內部非訪問;缺乏必要的攻擊審計作為犯罪取證,出此之外,還有管理上的一些問題,如人員安全意識不強,安全制度不夠健全等多方面原因。
  6. The second part studied the characteristics of modern logistics enterprises, pointed out the concept of modern logistics enterprises valuation, and analyzed how the value of modem logistics enterprises come from. the third part discussed the approaches and the factors of modern logistics enterprises valuation. based on the introduction and the criticism of the traditional valuation approaches, the forth part presented suggestions on how to set up our country ' s system of approaches and how to choose approaches to valuate the modern logistics enterprises on different phases. the fifth part embodied the new idea by the instance of wuhu port company ' s valuation

    本文共為五大部:提出現代物流企業價值評估的現狀、意義和面臨的問題,形成了本文的第一部內容;通過對現代物流企業行業特析,剖析現代物流企業價值的內涵,並對現代物流企業價值的形成途徑和影響因素進行闡述,形成了本文的第二部內容;重新審視現代物流企業價值評估的各種要素,進而揭示出各種評估方的利弊,形成了本文的第三部內容;提出現代物流企業價值評估中的難及對策,並在此基礎上,給出各個階段現代物流企業價值評估方選擇的建議,並構建我國現代物流企業價值評估方體系的總體思想,形成了本文的第內容;將全新的評估思路運用到對蕪湖港儲運股份有限公司的價值評估過程中去,進行實證析,形成了本文第五部內容。
  7. Under the guidance of new principles and methods of sedimentology and reservoir sedimentology, this thesis takes jialingjiang formation in qianwei area as the main object of study. the petrology characteristics and sedimentary facies of nine basic wells have been studied exhaustively, from which it is deducted the depositional framework, and main types and characteristics of sedimentary facies in jialingjiang formation. then four types of sedimentary facies are recognized and their facies models are established

    本論文以現代沉積學與儲層沉積學的新理論、新觀、新方為指導,以犍為地區嘉陵江組為重研究對象,通過9口基幹井的單井巖石學特徵、沉積相的析,闡述了犍為地區嘉陵江組的沉積格局以及主要的沉積相類型與特徵,識別出了種不同類型的亞相,並別建立了沉積相模式;在單井沉積相析的基礎上,通過三條連井剖面沉積相的對比研究,闡明了犍為地區嘉陵江組沉積相的縱向與橫向發育規律。
  8. In the light of defects of china ' s current company creditor protection system, it puts forward law advice from 4 aspects on how to perfect china ' s company creditor protection system according to china ' s practical situation. ( 1 ) establishment of the principle that company ' s act in excess of authority is relatively invalid. ( 2 ) establish the system of company ' s creditor ' s management restriction of the company

    該部是全文的重,主要是針對我國現行公司債權人保護制度的不足,並借鑒國外相關立的先進經驗,根據我國的實際情況,從以下個方面提出了完善我國公司債權人保護制度的律建議:一、確立公司越權行為相對無效原則;二、確立公司債權人對公司經營的制約機制;三、確立公司人格否認制度;、確立董事對公司債權人承擔民事義務制度。
  9. Tender must be clearly marked with the tender reference and the subject of the tender on the outside of the envelope but should not bear any indication which may relate the tender to the tenderer addressed to the chairman, public works tender board, and placed in the public works tender box located at the room 4128f, 41 f, queensway government offices, 66 queensway, hong kong

    及方:投標者必須在信封面註明招標編號投標項目但不得有任何記認,使人認出投標者的身及工務投標委員會主席收。投標者必須把投標書放入香港金鐘道六十六號金鐘道政府合署十一樓4128f室的工務投標箱內。
  10. The theory of fa in the work can be classified into four categories which embody the various conflicting ideas in the huanglao thoughts after the warring states

    《文子》的「」理論並不統一,其觀類,集中體現了戰國以後黃老學說中的諸種矛盾。
  11. In part in, the author studies the obligation - blinding mechanism to the trustees, which is the core of governance structure of fund, pointing out that one of the main reason for the serious abnormality of current funds is the lacking of duty performance of the trustees. though it is hand to set up an effective obligation - binding mechanism to the trustees under the chinese current legal system, we can learn from britain and the u ? s ? a. in part iv, the author studies the mechanism of balance inside the governance structure of funds, that is the supervision mechanism of trustors and the balance mechanism of fund - holders, then puts forward that strengthening the balance mechanism inside the funds is an important step to establish an effective governance structure of found ; further more, to deal with the problems in the two mechanisms the author makes some suggestion about perfecting the mechanism of balance inside the fund in china

    本文共個部,第一部通過對信託制基金本質和特析,指出了架構信託制基金治理結構的必要性,並闡述了架構我國基金治理結構應遵循的基本原則;第二部對架構信託制基金治理結構的基礎,也就是信託制基金的組織結構進行了研究,認為我國基金組織結構存在較大缺陷,但現存基金組織結構的立模式也不適宜我國照搬照抄,而自益信託、共同信託才是我國信託制基金組織結構的應然選擇;第三部對基金治理結構的核心問題,即基金管理人的義務約束機制進行了研究,指出:我國目前存在的基金行為異化現象嚴重的主要根源之一就是基金管理人義務的缺失;但在我國現行律制度框架內無架構起有效規制管理人的義務機制,而英美對基金管理人的受信人義務的規定值得我們借鑒;第對基金治理結構的內部監控機制,即基金託管人的監督機制和基金持有人的制衡機制進行了研究,指出:強化基金內部監控機制是架構有效的基金治理結構的重要一環;並針對我國這方面機制存在的問題提出了完善我國基金內部監控機制的建議。
  12. This algorithm increases the speed and accuracy of the motion vector search in intra - frame / inter - frame model selection, i proposed an adaptive selection method of intra - frame / inter - frame prediction model, based on tmn recommendation. in this paper, chapter one introduces the needs for low bit - rate video compression and relevant standards. chapter two first introduces briefly some common image compression methods, then emphases on the algorithms used in h263 + encoding and decoding

    本論文第一章概述了當今世界對甚低碼率視頻圖象壓縮編碼的需求以及相關的國際標準;第二章簡要介紹一些具體的圖象壓縮編碼方,對于在h . 26x編解碼器中運用到的圖象壓縮演算給予了重介紹;第三章詳細探討了h . 26x系列標準,對于重和難作了詳細的闡述;第章是具體的編解碼器設計以及核心演算描述;第五章是h . 26x編解碼器在局域網視頻傳輸中的一個具體運用。
  13. Visual analysis of human motion has been receiving increasing attention from researchers in the fields of image processing and computer vision during the past few years. it has a lot of applications in virtual reality, smart surveillance system, advanced user interface, motion analysis and video compressing, etc. this paper focuses on the technology of human motion tracking based on video, first, we make a summarization of the domestic and overseas status of the research in this field. on the basis of this, we analyse the technical difficulties of human motion tracking. as most of the existing model - based methods of human motion tracking perform not so good in some situation as they need mannual intervention, and also the precision of tracking is not so satisfying during the research of tracking of walking people because of the self - occlusion of legs, this paper proposes an algorithm of automatic detection and tracking of legs of the walking people based on monocular image sequences, in which we analyse the features of walking people, track the five joints of lower limbs, get various parameters, and then re - construct the walking process. the main research achievement is as follows : 1 ) we propose an algorithm of markerless automatic extraction of leg skeleton. first we divide the video into continuous image sequences, after background subtraction, the satisfying human region could be extracted, then we get a single - connected region by converting the rgb image to binary image and median filtering. afterwards, the contour of lower limbs in the frame with a widest boundingbox is detected, using sobel operator, to find the ankle joint of leg behind according to the features and rules of walking, then, the joint of knee of leg behind, hip, ankle of leg in front, knee of leg in front could be got in turn. so, model of leg skeleton is constructed

    首先將視頻解成許多連續的靜態圖像幀,經過背景去除,把感興趣的人體區域提取出來,通過二值化,中值濾波等預處理方得到只有人體的一個單連通區域,然後用sobel運算元檢測出boundingbox最寬幀中人體下半身的輪廓,根據運動規律及特徵找到後腿踝關節,結合從boundingbox最窄幀中所獲取的腿長依次得到後腿膝關節,跨部關節,前腿踝關節,前腿膝關節,從而構建出腿部骨架模型。 2 )實現了人體步行腿部骨架的跟蹤演算。在完成對腿部骨架模型的自動初始化之後,本文對跨關節、膝關節及踝關節別採用運動建模、圓周相交定演算、運動預測及預測周圍搜索rgb相似矩形塊三種方確定每一幀中其實際坐標,從而重構出腿部骨架的運動過程。
  14. For bilateral symmetry objects, the techniques on symmetry - point detection and symmetry - axis extraction are presented based on harmonic conjugation relationship. for rotated symmetry objects, the techniques on rotated units description and rotated symmetry center extraction are presented based on center invariants of objects. further more, by using 3d invariants and 2d projective transformation, an approach to recover shape from part symmetry objects is realized on some conditions

    ( 3 )深入析了2d對稱性目標透視成像的幾何特,將共線交比用於目標輪廓上的關鍵的特性描述中;利用調和共軛關系,提出了一種針對左右對稱型目標的對稱檢測和對稱軸提取的演算;利用交比關系構造了目標的形心不變量,提出了一種針對旋轉對稱型目標的旋轉對稱單元判定、旋轉中心提取的演算;進一步利用3d不變量和2d射影變換,實現了一定條件下的對稱性目標的形狀恢復技術。
  15. The achievements are as follows : 1 ) the system model based on the whole course in of erp project theory have been put forward, erp ' s project are divided into three stages in this model, evaluation is divided into four parts, and the indexes that should been evaluated at each stages and relationship among these stages has been described systematically ; 2 ) at proposed stage, according to the characteristic of erp project, feasibility analysis should been carried out from seven respects such as managing foundation technological foundation, the fund foundation, personnel foundations, basic data, understanding and demand to erp and goal of the enterprise ; 3 ) in selecting software, 18 indexes and three factors have been put forward including system quality of the software, the fact relating to the software supplier serves, and the fact relating to enterprise, then use ahp to evaluate ; 4 ) in project implementation the evalution flow model on the basis of implementing and the index system have been proposed. the index system include 14 indexes and three respects respect which are control of the goal and plan, quality of the system use, and quality of information. 5 ) performance measurement of erp project is proposed in four respects of balanced scorecard. and according to the characteristic of erp project performance, the result of measurement should been calculated with fuzzy mathematics, then a satisfaction index can be drawn

    主要成果表現在: 1 )在評價erp項目評價理論基礎方面提出了基於全過程erp項目的評價體系模型,在此模型中將erp項目實施為三個階段,評價個部,並系統論述了各個階段應該評價的指標,以及各個階段的相互關系; 2 )在項目可行性析部,根據erp項目的特提出了從七個方面別是:管理基礎、技術基礎、資金基礎、人員基礎、基礎數據、對erp的認識與需求,和企業的目標對erp項目進行可行性析; 3 )在軟體選型部,提出了軟體系統質量因素、與軟體供應商服務有關的因素、和與企業有關因素三個方面18個指標的評價體系,並用層次進行評價; 4 )在項目實施階段,提出了基於實施過程的評價流程模型,同時提出了評價指標體系從計劃,目標的控制、系統使用質量、和信息質量三個方面14項指標來評價實施過程; 5 )在項目績效評價部,提出以平衡記個方面評價erp項目的績效,建立了bsc - erp評價模型,並根據erp項目績效的特提出了用模糊數學對評價結果進行計算,得出一個滿意程度指標。
  16. In this part, the author induces the concept of the drug transport crime through detailed analysis on the four constituents of the drug transport crime and comparison on the different viewpoints and practice in the theory circle and the practice

    在這一部,筆者通過詳細析運輸毒品罪個構成要件的特徵,比較理論界和實踐中各種不同的觀和做,歸納出了運輸毒品罪的概念。
  17. In this dissertation, the principle of fem in em was discussed, then the pulse radar and three - layered pavements were analyzed with 20 - noded and 4 - noded isoparametric elements respectively. then, corresponding fem programs are compiled in fortran90. so a forward model was built up to describe the transmitting of electromagnetic in the radar and pavements, according to the system identification method

    針對上述情況,本文系統闡述了電磁場有限單元的基本原理,然後採用二十節等參單元別對pulse雷達實體及三層路面系統進行了靜態場和時變場的有限元析,初步建立了電磁波在三層路面中傳播的正演模型,同實測波形相比,模擬效果較好,並用fortran90語言編制了相應的三維、二維有限元程序,具有較好的可讀性和可移植性。
  18. The plant community structure and its spatial dynamics in natural pinus yunnanensis forest region, which belonged to yipinglang forest farm of lufeng county, yunnan, were field investigated in april 2005

    摘要於2005年4月採用中點四分法對雲南省祿豐縣一平浪林場雲南松天然林區植物群落結構及空間動態進行了實地調查研究。
  19. In this paper, a new method, numerical manifold method, is introduced, and applications of adaptive fem, incremental elastoplastic theory and shear strength reduction technique are on second thoughts

    首先,基於數值流形方和有限覆蓋技術,提出了適用於biot固結析的三節平面協調流形元。
  20. Chapter 1 will give the concept of the telecommunication industry, and analyze the content, mission and targets of the administration of this industry ; chapter 2 will be divided into two parts, the first will analyze the theories about telecommunication industry, the second will analyze the conditions and problems of the administration of telecommunication industry in china ; chapter 3 will give the conditions and their analysis about the administration of telecommunication industry in america, korea and japan ; chapter 4 is the important part of this paper, which will analyze the principle and mission, the lawmaking and administrative organizations of the administration of telecommunication industry. though this part, i will put forward my suggestions

    第一章析電信業的概念和電信監管的內涵、一般性任務和目標;第二章為兩個部,首先從宏觀經濟學、公共經濟學的角度作電信監管的理論析,再從我國電信業現狀著手探討我國電信業競爭的割據、監管的體系及存在的問題等;第三章將析美國、韓國、日本三個國家電信監管的情況,總結國外電信監管的經驗和教訓;第章是文章的重,在這章中將析和探討我國電信監管的原則、任務,我國電信立問題,依設立電信監管機構等方面對我國電信監管提出筆者的對策建議。
分享友人