Приклади вживання Mathrm Англійська мовою та їх переклад на Українською
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
Macro shortcut for\mathrm command.
Eq.(7) shows that matrix B in(4) is B= D N(8){\displaystyle\mathbf{B}=\mathbf{DN}\qquad\qquad\qquad\qquad\mathrm{(8)}}.
Let's say the function do u b l e{\displaystyle\mathrm{double}} is defined as λ x.
For a one-sided Noetherian ring, there is a surjection from the set of isomorphism classes of indecomposable injective modules onto the spectrum S p e c(R){\displaystyle\mathrm{Spec}(R)\,}.
P← n o t p{\displaystyle\neg p\ leftarrow\ mathrm{ not}~ p} (the closed world assumption) and.
Has exactly one stable expansion Δ={ n o t q{\displaystyle\mathrm{not}~q}}.
X{\displaystyle\displaystyle X_{n}\,{\xrightarrow{\mathrm{a.s.}}}\, X} As the names indicate, weak convergence is weaker than strong convergence.
Now if we first learn the value of X{\displaystyle X}, we have gained H(X){\displaystyle\mathrm{H}(X)} bits of information.
Then, the function call d o u b l e 2{\displaystyle\mathrm{double}\ 2} would be reduced by substituting 2{\displaystyle 2} for every copy of x{\displaystyle x} in the body of the function definition.
When the user wishes to authenticate, he supplies h 999( p a s sw o r d){\displaystyle h^{999}(\mathrm{password})} to the server.
Note that s u p p(X∪ Y){\displaystyle\mathrm{supp}(X\cup Y)} means the support of the union of the items in X and Y. This is somewhat confusing since we normally think in terms of probabilities of events and not sets of items.
In practice, it is possible to build a type I n a t 3 4{\displaystyle I\\mathrm{nat}\ 3\ 4} but there will not exist a term of that type.
The affine group is generated by the general linear group and the translations andis in fact their semidirect product<math>V\rtimes\ mathrm{ GL}( V)</ math>
Once X{\displaystyle X} is known, we only need H( X, Y)- H(X){\displaystyle\mathrm{H}(X, Y)-\mathrm{H}(X)} bits to describe the state of the whole system.
This eventually became the top serif in the modern numeral, but the occasional short horizontal line at the bottom probablyoriginates from similarity with the Roman numeral I{\displaystyle{\mathrm{I}}}.
For example, a server begins by storing h 1000( p a s sw o r d){\displaystyle h^{1000}(\mathrm{password})} which is provided by the user.
Virtual strains consistent with element's virtual nodal displacements: δ ϵ= Bδ q( 9){\displaystyle\delta{\boldsymbol{\epsilon}}=\mathbf{B}\delta\mathbf{q}\qquad\qquad\qquad\qquad\mathrm{(9)}}.
Calling or"applying" a function to an argument may be written with or without parentheses, so d o u b l e( 2){\displaystyle\mathrm{double}(2)} or d o u b l e 2{\displaystyle\mathrm{double}\ 2}.
Where I λ s u n{\displaystyle I_{\lambda\mathrm{sun}}} is the emission spectrum of the sun, and ϵ λ E b λ( λ, T){\displaystyle\epsilon_{\lambda}E_{b\lambda}(\lambda,T)} is the emission spectrum of the paint.
This has led to some ambiguity in the literature, with some authors attempting to resolve the inconsistency by redefining cross-entropy to be D KL( p∥ m){\displaystyle D_{\ text{ KL}}( p\ parallel m)}, rather than H( p,m){\displaystyle\mathrm{H}(p, m)}.
Note that n o t p{\displaystyle\mathrm{not}~p} can be different from the statement¬ p{\displaystyle\neg p} of the logical negation of p{\displaystyle~p}, depending on the completeness of the inference algorithm and thus also on the formal logic system.
Combining the two negations, it is possible to express, for example¬ p← n o t p{\displaystyle\neg p\leftarrow\mathrm{not}~p}(the closed world assumption) and p← n o t¬ p{\displaystyle p\leftarrow\mathrm{not}~\neg p}( p{\displaystyle p} holds by default).
An eavesdropper seeing h 999( p a s s w o r d){\displaystyle h^{999}(\mathrm{password})} communicated to the server will be unable to re-transmit the same hash chain to the server for authentication since the server now expects h 998( p a s s w o r d){\displaystyle h^{998}(\mathrm{password})}.
Although, by Kirchhoff's law, ϵ λ= α λ{\displaystyle\epsilon_{\lambda}=\alpha_{\lambda}} in the above equations, the above averages α s u n{\displaystyle\alpha_{\mathrm{sun}}} and ϵ p a i n t{\displaystyle\epsilon_{\mathrm{paint}}} are not generally equal to each other.
However, Michael Gelfond showed that it is also possible to interpret n o t p{\displaystyle\mathrm{not}~p} literally as" p{\displaystyle p} can not be shown"," p{\displaystyle p} is not known" or" p{\displaystyle p} is not believed", as in autoepistemic logic.
For certain problems, input/output representations and features can be chosen so that a r g m a x y f( x,y)⋅ w{\displaystyle\mathrm{argmax}_{y}f(x, y)\cdot w} can be found efficiently even though y{\displaystyle y} is chosen from a very large or even infinite set.
If triangle ABC is congruent to triangle DEF, the relationship can be written mathematically as:△ A B C≅△ D E F.{\displaystyle\triangle\mathrm{ABC}\cong\triangle\mathrm{DEF}.} In many cases it is sufficient to establish the equality of three corresponding parts and use one of the following results to deduce the congruence of the two triangles.