对称的
- 与 对称的 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
In the end, it analyzes the coordination contracts of transfer payment under symmetry and asymmetry information.
在对称信息和不对称信息的条件下,给出了基于转移支付的协调契约。
-
The author considers that the unintelligibility of the structure of property right, the asymmetry of accounting information and the insufficient constraint-incentive mechanism are the main causes lead to accounting in...
笔者认为,产权结构不清晰、会计信息不对称、公司治理结构不完善是导致会计信息失真的主要原因,而三者之间又存在着内在的联系,即产权结构不清晰是根源,其导致会计信息不对称及公司治理结构不完善。
-
The author considers that the unintelligibility of the structure of property right, the asymmetry of accounting information and the insufficient constraint-incentive mechanism are the main causes lead to accounting informat...
笔者认为,产权结构不清晰、会计信息不对称、公司治理结构不完善是导致会计信息失真的主要原因,而三者之间又存在着内在的联系,即产权结构不清晰是根源,其导致会计信息不对称及公司治理结构不完善。
-
A configuration that transition points are reflection symmetric about the midpoint with phase offset in one period is proposed. The intensity of the zero order becomes the function of the phases and can be eliminated.
采用周期内位相突变点镜向对称,前后半周期位相相差结构设计的反对称型达曼光栅,可使其零级衍射光斑强度仅是位相的函数,因此可消除零级谱点。
-
Intrinsic cell fate determinant Numb is the first protein found to be asymmetrically distributed during neural development.
Numb蛋白是神经发育中第一个被发现呈不对称分布的蛋白,是产生不对称细胞分裂的重要因素之一。
-
For any initial generalized bisymmetric matrix $X_1$, when $AXB=C$ is consistent, we can obtain the generalized bisymmetric solution of the matrix equation AXB=C within finite iterative steps by the iteration method in the absence of roundoff errors; Moreover, the least-norm solution $X^*$ can be obtained by choosing a special kind of initial generalized bisymmetric matrix.
在不考虑机器误差的情况下,当矩阵方程AXB=C相容时,对任意广义双对称X_1,矩阵方程AXB=C的解可以经过有限步迭代得到;特别地,通过选择特殊地初始广义双对称矩阵极小范数解X^*。
-
Chiral auxiliary controlled asymmetric reaction is one of the main methods in asymmetric synthesis.
手性助剂控制的不对称反应是不对称合成的主要方法之一。
-
The systems include application sub-system and cretification authority, application sub-system apply symmetric and asymmetric cryptosystem and public-key certificate which was authoticated by CA and can certify the valid user-identity to set up secure communication channel, exchange session key and provide message integrity, confidetiality, authentication and nondeniability.
系统包括证书中心和应用子系统,证书中心签发证书用来证明用户的合法身份,应用子系统应用证书和对称、非对称密码体制,识别用户合法身份,建立了安全通信通道和交换会话密钥,实现了通信数据的完整性、保密性、真实性、不可否认性。
-
As to the CVC hot strip mills which spread to the world soon after its boom in the 1980s, this paper analyzes its dissymmetric CVC roll surface curves, and builds dissymmetric rolls elastic deforming model and crown and shape calculation model of CVC hot strip mills.
对八十年代兴起并得到迅速推广的CVC热带钢连轧机,本文对其非对称CVC辊型特点进行了分析,建立了非对称问题的辊系弹性变形模型,并研究了CVC热连轧机板凸度和板形计算模型。
-
Classified by commodity variety, it can be categorized into the counterfeiting of consuming goods, agricultural goods, architectural materials, medical goods, industrial means of production, publication, paper currency and cultural relics; classified by nature, it can be categorized into fake commodities and substandard commodities; classified by information structure, it can be categorized into the counterfeiting of symmetric information and dissymmetric information.
按照商品品种分类,可以分为消费品类假冒伪劣、农资类假冒伪劣、建筑类假冒伪劣、药品类假冒伪劣、工业生产资料类假冒伪劣、出版类假冒伪劣和纸币文物类假冒伪劣;按照性质分类,可以分为假冒商品、伪劣商品;按照信息结构分类,可以分为不对称信息的假冒伪劣、对称信息的假冒伪劣。
- 推荐网络例句
-
As she looked at Warrington's manly face, and dark, melancholy eyes, she had settled in her mind that he must have been the victim of an unhappy attachment.
每逢看到沃林顿那刚毅的脸,那乌黑、忧郁的眼睛,她便会相信,他一定作过不幸的爱情的受害者。
-
Maybe they'll disappear into a pothole.
也许他们将在壶穴里消失
-
But because of its youthful corporate culture—most people are hustled out of the door in their mid-40s—it had no one to send.
但是因为该公司年轻的企业文化——大多数员工在40来岁的时候都被请出公司——一时间没有好的人选。