英语人>网络例句>规则性 相关的搜索结果
网络例句

规则性

与 规则性 相关的网络例句 [注:此内容来源于网络,仅供参考]

Considering the gap between academic research and real world application, the characteristic of manufactories of "much variety and little batch", this paper discusses the abstraction and modeling of the workshop performance using colored Petri net characterizing definite description of DEDS. And rule bases are applied into the model to tackle the dynamic events and disturbances with dynamic scheduling. After analysis on agile response of MES and integration of its scheduling model, by adopting distributed component technology the workshop scheduling model was capsulated as a scheduler to realize the scheduling module of MES easier to be integrated and rapidly reused. Finally a prototype of scheduler is proposed.

鉴于最优调度理论与实际调度应用的距离,以及多品种单件小批量车间生产的特点,本文以某模具制造企业生产车间为研究对象,利用对离散动态系统具有准确描述能力的着色 Petri 网对车间生产进行了抽象和建模;并通过向网系统中引入规则约束,为车间内的动态事件和扰动提供了动态调度;在对 MES的敏捷性及其车间调度模块的集成性进行了多方面分析后,利用分布式组件技术将调度模型进行了软件封装,以便为 MES 提供一个功能独立、易集成、可快速重用的生产调度模块;最后给出了一个 MES 车间调度服务器和调度室客户程序的原型实现。

Firstly, based on the analyzing the problems of the existing C~4ISR system architecture verification methods, the C~4ISR system architecture verification methods based on CADM is present, and the conception of this methods is given. Secondly, the basic connotation of this methods is studied form the views of the theory base and main superiority. Thirdly, the architecture information model is established, and based on this model the content framework of the C~4ISR system architecture verification methods is present. Lastly, the key techniques needed to solve in the framework is discussed.2. The verification methods of data categoricalness based on CADM are studied.

首先在分析现有体系结构验证方法所存在问题的基础上,提出了基于CADM的C~4ISR系统体系结构验证方法,并对该方法的概念进行定义;其次从理论基础和主要优势两个角度研究了基于CADM的C~4ISR系统体系结构验证方法的基本内涵;再次建立了体系结构信息模型,并以此为基础提出了基于CADM体系结构验证的内容框架;最后提出并解释了基于CADM体系结构验证方法所要解决的关键技术,包括基于CADM的数据完备性验证方法、可达性验证方法、数据一致性验证方法、系统结构合理性验证方法和作战规则合理性验证方法等。

The design includes many new technologies in data exchange and data security, they are: Converting non-XML data to XML in order to apply the XML security technology to more data types; Using the technology of XKMS and PKI to manage the public key in order to overcome the shortage of complexity and difficulty in using PKI and improve the efficiency of the public key management; Using Diffe-Hellman algorithm combining with the public key technology to exchange secret key in order to furthest increase the security of the key; Using the technology of XML digital signature algorithm to ensure the integrity, message authentication and signer authentication of the data; Using the technology of XML encryption to ensure confidentiality of the data; Defining delegable access rules on the structure and content of the XML documents to provide fine-grained access control. According to the XML security framework, a XML security library is designed and implemented.

在对XML及其安全技术主要包括XML加密技术、XML数字签名、公钥管理、密钥产生和交换进行研究的基础上,结合传统密码技术和XML安全技术提出了一种基于XML的数据安全模型,模型中包含了目前网络数据交换和安全领域的一系列最新技术,主要有:将非XML格式数据转换为XML格式数据的方法,以保证现有的大部分网络数据能够应用XML安全技术;使用XML公钥管理技术结合PKI技术管理公钥,以克服PKI技术实施和部署复杂、难度大等问题,提高公钥管理的效率;使用Diffie-Hellman算法结合公钥技术交换密钥,以最大限度保证密钥的安全;使用XML数字签名技术保证数据的完整性、不可否认性和发送方身份认证;使用XML加密技术保证数据的机密性;根据XML文档的内容和结构定义授权访问规则进行良好的访问控制。

Second, seriously unbalanced economic structure, the disintegration of Soviet Union, and the dimiss of OECD were unneglectable factors of ecnomic crisis of Russia.

从制度的可移植性来看,发达的市场经济国家的一些市场规则是可以移植的,而融入了发达国家意识形态和文化积淀的市场经济模式的可移植性则要差得多。

Still, the definition, operationalization, and classification of these concepts have all been criticized. In addition, when used in Cross-countries studies there have been glaring methodological errors. Furthermore, at the national level, electoral formula and district magnitude have only limited influence on disproportionality.

不过,本文研究发现:这些概念在界定、运作化与分类等方面都有争议;而且学者们所从事的跨国性比较研究,在方法论上也有明显的缺失;再者,当选规则与选举区规模,对全国层次选举结果不比例性的影响属次要因素,只有间接作用。

This text will account the information behavior loses to really classified into the individual loses the true( include the mistake lose true with not and faultily the sex loses true) losing with the community true, here the foundation is last, distinguishing from neglect the gist to lose to really proceed the analysis with too self-confident two angles to the individual fault, from accountancy's rule, accountancy's technique, organize the characteristic wait four angles to lose to the community to really proceed the analysis with the culture, and put forward to manage the measure homologously respectively.

本文将会计信息行为失真区分为个体失真(包括过失性失真和非过失性失真)和群体性失真,在此基础上,分别从疏忽大意与过于自信两个角度对个体性的过错失真进行分析,从会计规则,会计技术,组织特征和文化等四个角度对群体性失真进行分析,并分别提出相应的治理措施。

According to the definition and the distribution of VSR's voltage space vector, the introduction of a rule-based SVPWM current control strategy, with non-fixed switching frequency and dual hysteresis loops, that obviously improves the performance of current control. Based on two kinds of control strategies of VSR under unbalanced grid condition, the introduction of a new VSR control strategy featuring undamped-oscillation that simplifies the controller structure and effectively improves VSR's performance under unbalanced grid condition. A systematic description of the state switching in trilogic PWM signal generation of threephase CSR by using the conversion between bilogic and trilogic switching functions.

作者在如下工作的基础上对PWM整流器的一些关键问题提出了自己的研究思路、观点和方法:根据PWM整流器网侧矢量关系,直观地描述了其四象限运行的基本原理及特征;定量分析了VSR、CSR的PWM换相过程及波形特征;引入等效变压器模型并详细分析了VSR、CSR基于d—q模型的动、静态特性;提出了满足四象限有功、无功运行指标时的VSR交流侧电感设计方法;并提出了依据控制系统跟随性和抗扰性性能指标设计VSR、CSR直流侧储能元件的参数计算方法;在研究了VSR电流控制策略基础上,提出了影响VSR电流控制的几个要素,并进行了定量分析;根据VSR空间电压矢量的定义及分布,提出了基于规则控制的不定频滞环空间矢量PWM电流控制策略,并由此提出了具有双滞环特性的不定频滞环优化SVPWM电流控制策略,有效地改进了滞环PWM电流控制性能。

This method considers the information of question's interrogative part and non-interrogative part, and heuristic rules are used to expand question's relation triples to match metamorphosing answer sentences.

该方法引入了问题中的疑问性和非疑问性部分的信息,采用了启发式规则扩展问题的依赖关系三元组,从而匹配变形的答案句。

This method considers the information of question\'s interrogative part and non-interrogative part, and heuristic rules are used to expand question\'s relation triples to match metamorphosing answer sentences.

该方法挖掘了问题中的疑问性和非疑问性部分的信息,采用启发式规则来扩展问题的依赖关系三元组,从而来匹配变形的答案句。

One result of this interpretation is that Frye hearings often last longer than many trials. The mother of all Frye hearings took place in San Diego in 1987. At issue was the methodology of pre-DNA blood typing.

法定证据规则一般认为,程序如何更好的进行不应该是证据可采性听证会的主题,因为特定案件中鉴定质量影响的是证据的重要性而不是它的可采性。

第13/30页 首页 < ... 9 10 11 12 13 14 15 16 17 ... > 尾页
推荐网络例句

Means the parent directory, so this command means to execute "toolchain.sh," which is in the current directory.

代表父目录,所以这个命令就是执行当前目录下的"toolchain.sh"。

Yes,In fact,I'm on our city ream.

是的。事实上我是我们市队的。

The strong ionospheric disturbances caused by the significant magnetic storm appeared on the whole world.

用欧亚大陆地面电离层垂测站资料考察1989年3月12~16日磁暴期间的电离层暴形态及其发展变化。