英语人>网络例句>underlying topology 相关的网络例句
underlying topology相关的网络例句

查询词典 underlying topology

与 underlying topology 相关的网络例句 [注:此内容来源于网络,仅供参考]

Basing on the results of examining the impact on price, liquidity and volatility of underlying stocks after warrant issuance, the paper concludes that:(1) the issuances of warrant has the temporary positive effects on the underlying stocks" price and the positive effects happen on the introduction day but not on the listing day.(2) The issuance of the warrants causes the underlying stocks" trading volume and amount increases and heighten their liquidity.(3) The issuance of the warrants has no impact on the system risk-β, but decreases the total risk and volatility of underlying stocks.

本文最后通过综合认购权证和认股权证发行前后标的股票价格,流动性和波动性的变化结果后,认为:(1)认股权证的发行对标的股票的价格有短暂地正的价格效应,而这种对标的股票正的价格效应发生在认股权证公告日而非上市日;(2)认股权证的发行促使标的股票的交易量和交易额的增加,提高了标的股票的流动性;(3)认股权证的发行对标的股票的系统风险即β值没有影响,但能降低标的股票的整体风险,减小标的股票的波动性。

Chapter Two illustrates the nature of the international guarantee.At first,the writer analyses the meaning of collateral nature and its theoretical basis.Thewriter points out that in order to reinforce the protection of the guarantor'sinterest,the guarantee is located as collateral guarantee in all countries'traditional legislation.In other words,the validity of the guarantee contract isdetermined by the underlying contract,i.e.if the underlying contract isestablished,the guarantee contract is established,too;if the underlying contract isvalid,and the guarantee contract is valid too.It is true,otherwise.But thedoctrine of autonomy of private law dominates the civil law and commercial lawin all the countries,so the parties are permitted to alter the collateral nature of theguarantee by an agreement under the related laws worldwide.so the collateralnature of the guarantee is not the compulsory nature of the law.This lays a solidfoundation for the emerging of the independent guarantee.The writer thenanalyses the meaning of independence and the cause of the booming of theindependent guarantee.In fact,the independent guarantee was originated fromthe change of the collateral nature by the parties contract.As a result,the validityof the contract of independent guarantee is not determined by the underlyingcontract as the collateral guarantee,But the validity of the independent guaranteecontract is independent from the underlying contract,the establishment and thevalidity of the contract of independent guarantee are not subjected to theunderlying contract.

第二章对国际信用担保的法律属性进行了论述,首先分析了从属性的含义及其理论基础,指出虽然各国传统立法为了加强对保证人利益的保护,都将信用担保定位于从属保证,即保证合同的效力取决于主合同的效力,主合同成立,保证合同也成立,主合同生效,保证合同也生效;主合同不成立,保证合同也不成立,主合同不生效,保证合同也不生效,但是由于私法自治的精神主导着各国的民商法领域,各国立法都允许当事人通过合同约定对信用担保的从属性进行改变,所以保证的从属性从来就不是信用担保制度的法律强制属性,这也为独立保证制度的出现奠定了制度前提;其次分析了独立性的含义以及独立保证兴起的原因,独立保证实际上就是当事人通过合同约定对保证从属性的改变,使独立保证合同的效力不再象从属保证合同的效力那样取决于主合同的效力,而是使独立保证合同的效力独立于主合同的效力,独立保证合同成立不因主合同的不成立而受影响,也不因主合同的无效而无效。

Product topology and box topology are two methods for introducing topologies in general Cartesian product,both of them are generalization of the concept of finite product topology.

积拓扑与箱拓扑是在拓扑空间族的笛卡儿积上引进的2种不同的拓扑,它们都是有限积拓扑的推广,对这2种拓扑作以比较是有益的。

This method combined the traceroute result with the topology information obtained by tomography to construct a final topology using minimum similarity cluster algorithm and merging and constructing anonymous routers algorithm.the simulation on ns2 shows that this method not only be able to infer the network topology which contains uncooperative routers, but also enormously reduce the number of probes.

该方法可通过提出的最小相似度聚类算法和匿名节点构造归并算法,将网络层析成像获得的拓扑信息与traceroute探测结果融合,构成最终的拓扑结构。ns2的仿真表明,该方法不仅可识别包含不协作节点的网络拓扑,且所使用的探测包的数量也大大减少。

By the analysis above,we can define a quotient topology on a fibrewise set and then get the fibrewise quotient topology ,and it extends some properties of the general topology.

通过本文的分析,可知在纤维拓扑学中仍然可以在一个纤维集上定义商空间使其成为纤维商空间,并且它还延续了一般拓扑中的一些性质。

The article analyses the general situation of topology technology for single-phase PFC,discusses the development of topology technology for single-phase PFC from characteristic aspect and gives out the trend of development of topology technology for single-phase PFC in future.

文章分析了单相功率因数校正电路技术的概况,从实现的方式及其特点等方面较系统地论述了单相有源功率因数校正电路拓扑技术近期的发展,并指出了今后单相功率因数校正电路技术的发展趋势。

This article discusses two types of clustered network topology: homogeny cluster head hierarchical topology and heterogeneous cluster head hierarchical topology.

本文讨论了两种拓扑结构:簇头异构的分簇式网络拓扑结构和簇头同构的分簇式网络拓扑结构。

With the fact that there are some topology vectors that vary with different formula in each circuit topology, another identification way can be carried out by selecting and measuring the best topology vectors.

另一方面,基于电路的拓扑向量在不同电路拓扑中变化规律各不相同的基本事实,通过对最简拓扑向量的选取、验算及监测,可依据较少的检测量而实现电力电子电路的拓扑辨识。

Hierarchizing and decomposing the triangular incidence matrix, topology information of network is extracted, which is suitable for network topology identification of common tree structure, even suitable for network topology identification of the structure with parallel branch.

这种方法适用于实际应用中常见的树状结构拓扑的辨识,甚至适用于带并联支路的网络拓扑辨识。

The model of weighted LRIV for topology error identification and the method of calculating the weighting factor are formed. It can make the weighted innovation value of the topology error branch show up and improve identifying ability for topology error in little load flow value branches.

形成加权新息识别拓扑错误的模型和权值计算方法,这种加权算法使得发生拓扑错误的支路相应的加权连支推算新息元素值加大,可以改善新息图法对于小功率支路上发生的拓扑错误的识别能力。

第2/100页 首页 < 1 2 3 4 5 6 7 8 9 ... > 尾页
相关中文对照歌词
Underlying Depression
Tired
Fall
Liquor Lyles Cool July
It's Really Not As Complicated As You're Making It Out To Be
Letters From A Porcupine
1000 Words
Legacy
English Summer
Groove Is Where You Find It
推荐网络例句

Among which is the mindset, perceptions and moralities of those who accept mini- military tasks for economic gains.

其中最重要的是心态,观念和道德的人谁接受小型军事任务的经济收益。

In time course imaging, activity peaked 2 days after coronary ligation.

在时程成像检测,活性峰值在冠脉结扎后2天。

Though P2P model provides convenience file exchanging environment, but it fallows lots of users pirating in P2P network.

与过去不同的是,在P2P模式中,使用者的盗版行为不仅有下载的行为,也包括了分享的行为。