proof theory 中文意思是什麼

proof theory 解釋
證蜜
  • proof : n 1 證明;證據;【法律】證件;【法律】(口頭或書面)證詞,證言。2 檢驗,考驗;驗算;檢定的品質[強...
  • theory : n. 1. 理論,學理,原理。2. 學說,論說 (opp. hypothesis)。3. 推測,揣度。4. 〈口語〉見解,意見。
  1. Taking a view of pure time field, this paper presents dissolvable signals and basic concepts of sampling ; and also gives the very condition of discrete of signal ; this paper uses linear algebra to analysis this kind of signal and then gives some results and relevant deductions ; based on these results, 1 made a further step to analysis some typical band - limited signals in order to proof the coherence of my theory of dissolvable signal to the typical sampling theory ; i made some preliminary study about the feasibility of sampling and recovering of this kind of signal

    本文從純時域角度出發,給出了可分解信號及其采樣的基本概念;也指出了信號可離散化的條件;利用線性代數理論給出了對這類信號進行采樣的分析理論及相應的推論;並用這些結論對典型的帶限信號進行了分析,證明可分解信號采樣定理與經典采樣理論的一致性;初步探討了對這類信號的實行采樣與恢復的工程實現問題。
  2. The geologic, element and experimental study suggest the mechanism of small body, giant deposit in jinchuan is succeeding segregation whole magma chamber intruding from deep to emplace. the study is proof, supplementary and progress of the deep segregation, penetrating ore formation theory, which was advanced by mr tang zhongli, the academician of china. 5

    特別是通過鉑族元素、稀土元素研究、實驗地球化學研究及其與實際資料的對比,提出了金川礦床成巖成礦是從深部到侵位持續熔離的新模式,論證、補充和發展了湯中立院士提出的深部熔離成礦說。
  3. The third part of this article mainly discusses the causal relationship in market manipulation, which is a block of the enforcement of the law against market fraudulences. because market manipulation is a kind of special tort, the author agree on the use of the " proof to the contrary " theory to lighten the proof burden of the damaged party in causal relationship. besides, this part also discusses such issues as how to decide the scope of legal plaintiffs, how to assess the losses of the damaged party

    本文第三部分「操縱市場的因果關系研究」從民法一般的因果關系理論入手,並結合操縱市場的侵權行為中因果關系的特殊性,論述了操縱市場的侵權行為中因果關系是否成立的判斷標準,並主張對因果關系在民事訴訟中舉證責任的分配應突破「法律要件分類說」的要求,適用因果關系舉證責任倒置的做法,即由操縱市場案件中的被告負擔證明責任成立因果關系不成立的舉證責任,否則即推定因果關系成立。
  4. A new method should be discovered to design the function block. the thesis is based on the rheology and hydrokinetics of the polymer melt, and calculates the velocity in the die by fem simulation, and provides die design with theory proof. according to the existed theory, i summarize and conclude the fem formula of the polymer flow, and then write the program to calculate on the computer

    本論文中功能塊結構的研究,是以熔體的流變性以及流體動力學理論基礎上,對在口模中的熔體進行數值模擬,計算出熔體在口模中的流動參數(主要是速度的分佈) ,從而可以科學的對功能塊幾何結構進行優化。
  5. Marxist theory of instillation in terms of ideological and political education : its new proof

    對馬克思主義思想政治教育科學灌輸論的新論證
  6. In a human society aiming at meeting the increasing requirements of its members " material life and cultural life, marlow ' s demand theory has been broadly used in many social and economic areas due to its interpretation of the individual humanity and the group sociality. however, the mathematical methods in microeconomics can give us more elaborate proof to similar problems, for both mankind and institutions are of generality and can be expressed in quantitative terms in the economic analysis

    在一個以不斷地滿足人們日益增長的物質和文化生活需要為目標的人類社會里,馬斯洛的需求理論因其對個體人性和群體社會性的揭示而被廣泛應用到社會經濟生活中的許多層面,其實我們還可以從微觀經濟學的數學方法中找到更為精美的闡述。
  7. Let us put his theory to the proof.

    讓我們來檢驗一下他的說法吧。
  8. Give out a correctness proof for the protocol based on the strand space model theory and kailar logic

    使用ssm理論和kailar邏輯證明了該協議的安全性質。
  9. The subsumption and request of problem is formalized by xdd and the problem is evaluated by means of proof theory

    將證明論方法引入到xml中,建立了基於xml的證明論。
  10. The points about the certificate standard contain objective truth, proof on a balance of probabilities, many levels of structures theory and negation theory, but these theories deserve the study

    目前有關民事訴訟證明標準的學說主要有客觀真實說、或然性權衡說、多層次說和否定說,但這些學說都值得商榷。
  11. Aiming at the existence of coal dust and gas in the coalmine environment and the special requirements of mine case explosion - proof surface process, the error conversion model, shape precision characteristics, transfer drawings, descriptive equation and error transfer structure chart in the production technological process of case accessories adopting the information flowchart of control theory are discussed, which simplify the traditional block diagram of technological process and represent the relationship of working procedure ( variable ) by information flowchart instead of miscellaneous block diagram

    針對煤礦井下煤塵和瓦斯存在的環境特性、煤礦井用箱體防爆面加工的特殊要求,採用控制理論的信息流圖,對工藝過程中傳統方塊圖進行簡化,使繁雜的方塊圖解採用信息流圖表示工藝過程的工序(變量)之間關系。
  12. Numerical experiment is not the direct proof to theory, but its approximation to the fact is trustful. thus, it provides important clues for further theory research

    數值實驗結果雖然不是理論的直接證明,但是其近似真實情況的可靠性是值得信賴的,這無疑對進一步的理論研究提供了重要線索。
  13. The investigation of the exciton - phonon coupling of nn3 center offers a direct proof that all the phonon replicas are the phonon sidebands governed by the huang - rhys " multiphonon optical transition theory, and clarifies the speculations that the replicas associated with optical phonons are independent bound states of exciton - phonon complexes or due to other alternative mechanisms

    對其變溫pl譜的研究還發現,在nn :的聲子伴線區域呈現出的異于多聲子光躍遷理論的現象,說明在該區域可能存在著其它的n雜質態。
  14. First, in virtual of identification of flaws is a typical of in - verse problems, proceeding from time - harmonic electromagnetic maxwell ' s equa - tion and helmholtz equation, the uniqueness and existence of direct scattering problems including the numerical algorithms of diverse of boundary conditions is given. second, the uniqueness and existence of inverse scattering problems and the theory of ill - posed integral equation are briefly looked back upon. finally, indicator function method for boundary identification is set up under all kinds of boundary conditions for inverse scattering of homogenous and inhomogenous objects, meanwhile, the proof of possibility for near - field measurements and nu - merical simulation are given

    由於缺陷的識別是一類典型的反問題,因而首先從時諧電磁maxwell方程和helmholz方程出發,具體地闡述了求解正散射問題的有關方法,包括各種(夾雜)邊界條件下的數值解法,就解的存在性唯一性給予了肯定的回答;隨后對逆散射問題的理論作了簡短的回顧,包括解的唯一性以及非線性不適定積分方程的處理等;然後對均勻介質和非均勻介質的逆散射問題建立了在各種邊界條件下的邊界識別的指示函數方法,鑒于近場數據獲得的重要性,對近場測試時邊界識別的方法給予了相應的證明,並且實現了數值模擬。
  15. Deadline monotonic algorithm is studied from several perspectives including the development history of the theory, the scheduability test algorithm, priority inversion solutions, aperiodic task handling etc. and 2 important conclusions of the theory : static optimal property and the sufficient and necessary feasibility test, are discussed in proof form

    從理論發展歷史、可調度性測試方法、優先級倒置的處理、非周期任務的處理等幾個方面對截止時間單調演算法進行了研究。並對演算法的兩個重要結論:靜態最優性和可調度性測試方法分別進行了證明和推導。
  16. Users of the preliminary edition ( now out of print ) will be interested to note several new chapters on complexity theory : chapter 8 on space complexity ; chapter 9 on provable intractability, and chapter 10 on advanced topics, including approximation algorithms, alternation, interactive proof systems, cryptography, and parallel computing

    早期版本的讀者將驚奇的發現新增的有關復雜性理論的章節:第8章,空間復雜性;第9章,不可證明性;第10章,高級話題,包括近似演算法,交替,交互推理系統,密碼學和并行計算。
  17. Based on the characteristics of measurement safety inspection system for railway freight transportation under the condition of electrification and informationization, the essay the nessity to apply lightning proof by modern proof theory, and introduces the integrated lighting proof technology

    摘要針對電氣化、信息化條件下鐵路貨運計量安全檢測系統的特點,利用現代防雷理論分析對其進行雷電防護的必要性,並對其綜合防雷技術進行了相應介紹。
  18. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    濫用檢測採用的是特徵檢測的方法,實現較為簡單,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異常檢測能夠根據以往記錄的特徵平均值,判斷出異常情況,但是對于異常到什麼程度才視為入侵,這個閥值非常難以確定,閥值設定的太高,有可能漏過真正的入侵,如果設定的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵檢測系統把這部分異常記錄以一定的形式顯示出來或通知管理人員,交給管理人員去判斷,而這些ids系統難以判斷的記錄,如果對每個證據單獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證據關聯起來,專家或管理人員根據經驗能夠判斷訪問的合法性,本文試圖引入人工智慧中證據理論的推理策略和示例學習方法,代替人工檢查分析,可以提高效率,降低誤警率,並可以對一個正在進行得可疑訪問實現實時檢測,通過搜索及時判斷,及時阻斷非法訪問,比事後得人工處理更有意義。
  19. A clause is formalized as a relational algebra expression and evaluated by employment of relational algebra operations. 3. the proof theory based on xml is presented

    提出了利用關系代數運算實現xml查詢子句求值的方法,並證明了該方法的正確性。
  20. The author anticipate future of constitutionlism building in china and proof theory of constitution chang, recruitment and explanation. at the same time

    預測了我國憲政建設的趨勢,論述了現行憲法應修改、補充的內容及解釋原理。
分享友人