數據足夠 的英文怎麼說

中文拼音 [shǔgòu]
數據足夠 英文
lr
  • : 數副詞(屢次) frequently; repeatedly
  • : 據Ⅰ動詞1 (占據) occupy; seize 2 (憑借; 依靠) rely on; depend on Ⅱ介詞(按照; 依據) according...
  • : Ⅰ名詞1 (腳; 腿) foot; leg 2 (姓氏) a surname Ⅱ形容詞(充足; 足夠) sufficient; ample; enough;...
  • : Ⅰ形容詞(數量上可以滿足需要) enough; sufficient; adequate Ⅱ動詞1 (能達到、觸到或摸到) reach 2 ...
  • 數據 : data; record; information
  • 足夠 : enough; ample; sufficient
  1. Saudi aramco has not released enough data to quash a theory that its oil reserves are not nearly as large as it contends, and that its output may have peaked

    有一種理論認為沙特石油公司的實際石油儲備量並沒有其聲稱的那樣多,而且它的產量已經達到了頂峰,但是沙特石油公司未能提供來反駁這理論。
  2. While agreeing with this basic analysis, noted long time csicop psychic debunker ray hyman suggested the results were not enough on their own, and a wider data set was required

    而當與這個基礎分析形成一致意見之後,著名的超常現象科學調查委員會( csicop )的長期精神分析專家雷海曼暗示了他們自己的結果並不,需要更廣泛的
  3. With the rapidly development of computer network technology and the widely use of network technology in every walk of life, people transmit data through computer network more and more frequently, including all kinds of secret information ( for example, military secret ; bussiness secret ; personal private information ). today, as a result of poor security of our network system, we can not prevent the transmittied information from stealing and modifying unlawful. thus, the computer network technology is applied to our daily life restrictedly. recently, many network applications with voip ( for example msn messenger ; dialpad ; distributed multipoint multimedia conferences ) take no measures to encrypt their data

    隨著計算機網路技術的迅猛發展和網路技術在各行各業中的廣泛應用,人們通過計算機網路傳輸日益增加,其中包含了各種機密信息(例如軍事機密信息、商業機密信息、個人隱私信息等) 。由於目前的網路系統缺乏的安全性,不能有效防止網路上所傳輸的信息被非法竊取和修改,因而極大地限制了計算機網路技術在日常工作中的應用。當前,基於voip技術的各種網路應用,如msnmessenger , dialpad ,以及一些分散式多媒體會議系統,竟然未採取任何加密措施
  4. So security and safeguarding of information on computer networks has become one of the most import problems, because of the diversity of network ' s connection, the asymmetry of terminal ' s distribution, the interconnection of computer and the attack of hacker, cracker and vicious software. it is more important for military ' s automation commanding network and banks whose network communicates sensitive data. thus we should apply sufficient safeguarding to these networks, otherwise the computer network will be useless, even jeopard the national security

    但由於計算機網路具有連接形式多樣性、終端分佈不均勻性和網路的開放性、互連性等特徵,致使網路易受黑客、駭客、惡意軟體和其它不軌的攻擊,所以網上信息的安全和保密是一個至關重要的問題。對于軍用的自動化指揮網路和銀行等傳輸敏感的計算機網路系統而言,其網上信息的安全和保密尤為重要。因此,上述的網路必須有強的安全措施,否則該網路將是個無用、甚至會危及國家安全的網路。
  5. In recent years, plentiful and substantial fruits achieved by the lb method in simulations of hydraulics, multiphase flows, flows in porous media and heat transfer as well as magnetohydrodynamics, have revealed a broad perspective of application of this method, it will become a powerful competitor to the conventional approaches. in order to absorb the recent achievement in theory and application of the lb method, explore new ways in hydraulic computation to promote the development of practice, some work is car ried out in this thesis, as following : advances in the theory research and application, deductive process of the d2q9 model and some other commonly used models of the lb method are summarized. based on the hydrodynamic and general boundary conditions, a new joint boundary condition is presented, it integrates advantage of the two conditions above and obtains very good results in dealing with all kinds of boundaries of flow fields

    為了消化和吸收近年來lb方法在理論和應用方面的新成果,探索在水力計算方面的新途徑以促進lb方法實用化的發展,本文進行了下列研究工作:綜述了lb方法在理論研究和實際應用方面的新進展,以及d2q9模型的推導過程和其他一些常用的模型;在水動力邊界條件和通用邊界條件的基礎上提出了一種新的聯合邊界條件方法,它綜合了上述兩種邊界條件的優點,在流場的各種邊界處理中取得了非常好的效果,經過模塊化的處理以後這種邊界條件具有更好的實用性;針對均勻網格的lb方法計算效率較低的不,提出了雙重網格的latticeboltzmann方法,通過二維poiseulle流動、后臺階流動和渠道方槽流動三個算例的模擬,證明這種方法能明顯地提高流場模擬的計算效率;此外,根復雜區域流場的特徵提出了latticeboltzmann方法的分塊-耦合演算法,利用lb方法的計算特性實現塊與塊之間的交換,充分利用計算資源提高計算效率,通過對「 t 」型、 「十」型和「 x 」型分岔管道流場的模擬,展示了這種演算法的特徵和優點,以及它所具有的應用前景。
  6. These character based on sichuan power network ' s practice operation experience, in allusion to the config of the carrier wave protection in bypass breaker operating, through the study of protection ' s typical config : one side lfp - 902a, one side csl - 101a, proceeded comprehensive act module test, noted plenty of first hand test data and wave picture, proceeded detailed theory analyses, plenitude demonstration atresic type carrier wave distance protection when twain side atresic type logic is not completely same, basically can fill power network ' s requirement to relay of reliability selectivity speedly and sensitively

    本文結合四川電網的實際運行經驗,針對旁路開關代路運行時的保護配置情況,通過對旁路代路時保護典型配對組合:一側lfp - 902a ,一側csl - 101a的保護配置情況的深入研究,做了全面的動模試驗,記錄了大量的第一手試驗和波形,進行了詳細的原理分析,充分驗證了高頻閉鎖式距離零序保護在兩側閉鎖式邏輯不盡一致的情況下,基本能滿電網對繼電保護的可靠性、選擇性、快速性以及靈敏性的要求。
  7. Today, enough soundings are available to enable a relief map of the atlantic to be drawn and we know something of the great variety of the sea bed ' s topography

    現在已有的水深測量來繪制一張大西洋洋底地形圖,而且我對海底地形的千變萬化也有了一定的了解。
  8. A framework for dialectal chinese speech recognition is proposed and studied, in which a relatively small dialectal chinese or in other words chinese influenced by the native dialect speech corpus and dialect - related knowledge are adopted to transform a standard chinese or putonghua, abbreviated as pth speech recognizer into a dialectal chinese speech recognizer

    但在實際中,多人所說的普通話因受其方言背景的影響而不十分標準,這大大影響了語音識別的性能。一種解決方案是,對每種方言都收集多的語音然後構造相應的識別器,但由於漢語方言種類多且差異大,時間和成本都是很高的。
  9. These information - exchanging technologies mainly include the pos handset integrating barcode scanning, cpu card ' s storing and encrypting, double - card interlocking, the pos handset integrating modem and flashrom storing. this system integrates these information - exchanging technologies to gather, transmit and query information about civil explosive products " management expediently, swiftly and exactly. this system can lock responsibility for the civil explosive products in every their lifecycle and help supervising civil explosive products legally, strictly, exactly, syllabify and integrally

    系統地研究了民爆產品管理系統中的信息交互技術,主要包括便攜式pos集成條形碼掃描採集信息、 cpu卡存儲加密、 cpu卡雙卡鎖定、便攜式pos集成modem傳輸、 flashrom存儲技術等信息交互技術,民爆產品管理系統集成了這些信息交互技術,能滿信息採集方便快捷、信息上報及時迅速、信息查詢方便準確等需求,能對民爆產品在每一個環節鎖定責任單位和責任人,能對民爆產品進行"合法、嚴密、準確、清晰、完整"地管理。
  10. It would have been irresponsible action on the part of the government to promote untried vaccine without sufficient supporting data

    假如政府在未有支持下推行未經驗證的疫苗注射,是不負責任的行為。
  11. To adduce adequate evidence is called burden of adducing evidence, and to adduce evidence to prove the fact presented is cal led burden of demonstration

    提出量證的責任,稱為提供證責任。利用證對所主張的事實加以證明或者推翻不利推定,並達到法律規定的程度的責任,稱為論證責任。
  12. Chapter 4 studies scheduling algorithm of the core node to implement on single adsp2191. the result shows that a single adsp2191 chip can ’ t satisfy the bhp processing delay request and parallel processing is inevitable. chapter 5 primarily studies the core node ’ s scheduling algorithm with many dsp parallel process. details of lauc - vf scheduling algorithm analysis data flow organization and mission distribution are argued. the results of software simulation and hardware debugging indicate that many dsp parallel processing is effective and coincident with the system ’ s demand

    結果表明單片adsp2191晶元不能滿核心節點對bhp的實時處理要求,必須多dsp并行處理。第五章研究了核心節點調度演算法的多dsp并行處理。對多bhp批調度演算法的實現進行分析,探討了多bhp處理任務的的劃分和分配方案;多dsp間通信和傳輸的dma實現;最後對多處理器并行的處理時間進行模擬測試分析。
  13. Already exists or another file with that name already exists. sufficient storage space must exist for both the original and compacted versions of the database, in addition to any cached data and data stored in the temporary database

    除了要有的存儲空間供所有緩存和臨時庫中存儲的使用外,還要有的存儲空間供原始版本和壓縮版本的庫使用。
  14. Make sure that the logging directory you specified has enough space to handle the changing data volume

    請確保您所指定的日誌記錄目錄有大的空間,可以處理修改量。
  15. In this thesis, based on activity based classification, there are three subjects to be researched, that is, how to build and express cost caculation rules, how to support many caculation methods and how to support more quick and accurate cost caculation. moreover, this thesis lucubrates a flexible cost cacaulation model. this model bases on advanced cost theory - - activity based classification, and it includes the building of abc ' s cost caculation model, the receptions " automatical accumulattion and transformation rules, the storage and use motivating causes rules, the diverse cost distribution and supporting many cost caculation methods. besides, the model brings forward rules about cost information transformation and accumulattion, rules about keeping business records, rules about motivating causes ’ accumulattion, rules about cost distribution and formula language. what ’ s more, it builds a rule engine, and all of these make this model meet enterprises ’ demand for using many cost caculation methods, and then simplify operators ’ operation. also, it can realize cost accumulated more accuratly, keeping business records more promptly and cost analysed more intensively, and then give supports to enterprises ’ further decision with related data. in the third chapter, it expounds the design and realization of this flexible cost cacaulation management system, and use one model case to validate its legitimacy, which explains that with j2ee technology and mvc design pattern, this system has good features of reuse and adaptability. at last, it introduces its application in china resource alcohol co., ltd

    本文以作業成本法為理論基點,圍繞著如何建立成本核算規則並給予表達、如何支持多種成本核算方法以及如何提供更為快捷、精確的成本核算等三大主題展開深入的研究,並建立了多適應性成本核算模型。該模型以先進的成本核算方法作業成本法為理論基礎,涵蓋了從作業成本核算模型的建立到成本單自動歸集轉換等規則的提取,從動因量存儲使用等規則的建立到成本多樣化分配以及支持多種成本計算方法等全部內容。在對成本核算規則進行分析和表達的基礎上,該模型提出了基於作業成本法的成本信息轉換存儲規則、記賬規則、動因量歸集規則、分配規則以及計算公式語言,並建立了基於這些規則的規則引擎,從而使得該模型能滿企業多種成本計算方法的需求,簡化了企業人員的操作過程,並且實現了更為準確的成本歸集,更為迅速的成本制單,以及更為細化的成本分析,為企業的進一步決策提供了有力的支持。
  16. Be established to adopt the the group of technique light to treat their product as the dvd by successor, reason that this assertion that pine bottom electric appliances industry company is with the other 8 company is it can store 6 times the data that it is many, enough broadcast 4 hours high and clear to see the

    由索尼松下電器產業公司和其它8家公司成立的這個主張採取藍光技術的集團將它們的產品視為dvd的后繼者原因是它能儲存6倍之多的數據足夠播放4個小時的高清晰視頻。
  17. In addition, there is enough data exposed that everything else could eventually be determined by persistent players

    同時,游戲中暴露出的使得資生玩家總結出所有的東西。
  18. Our goals were to enable data sharing and help companies meet evolving business needs.

    我們的目標是使共享,並幫助企業滿擴展了的業務需求。 」
  19. The key to realize the organized integration of various data sources is how to specify all kinds of data by a unique data schema and mask the heterogeneity of their platforms and data structure, etc. there are some shortage in existing data integration systems : complex conversion of any data schema to the common schema ; little integration about semistructured data ; lackness of interoperability in bottom level communication mechanism based on software component

    實現無縫集成的關鍵和困難是如何以一種統一的模式描述各源中的,屏蔽它們的平臺、結構等異構性。已有的集成技術,存在一些不:公共模式同各源模式的轉換工作繁雜;對結構化的支持較好,而半結構化重視,源參與集成的程度不高;基於軟體組件的底層通信機制缺乏互操作性。
  20. The theoretical analysis and computer simulations reveal that, with hsnr conditions satisfied and enough data received, the correct classification probability of our sub - optimum algorithm can achieve about 100 %. 2

    對新分類方法的漸進性能分析和計算機模擬表明,在滿「大信噪比」條件下,當觀測數據足夠長時,正確分類概率趨於100 。
分享友人