最後操作 的英文怎麼說

中文拼音 [zuìhòucāozuò]
最後操作 英文
last operation
  • : 副詞(表示某種屬性超過所有同類的人或事物) most; best; worst; first; very; least; above all; -est
  • : Ⅰ動詞1 (抓在手裡; 拿; 掌握) hold; grasp 2 (做; 從事) act; do; operate 3 (用某種語言、方言說...
  • 最後 : last; final; ultimate
  • 操作 : 1 (按照一定的程序和技術要求進行活動) operate; manipulate; handle 2 (所進行的若干連續生產活動的...
  1. This paper mainly aims at the characteristics of the hardware and software structure of the parallel computer on satellite, and has fulfilled researches of fault tolerant technique in three aspects of control theories and engineering : the first research of the system level fault - tolerant module is based on the system structure of the parallel computer on satellite, a kind of cold backup module and a kind of hot backup module for multiprocessor computer have been put forward. then the research of software fault tolerant technique which is based on the operate system named rtems has been carried, the mission level fault - tolerate arithmetic and the system level fault - tolerate mechanism and strategies based on the check point technique have been put forward, at the same time the self - repair technique of software which has used the technique of system re - inject has been studied. finally the technique of components level fault - tolerant based on fpga has been studied, a kind of two level fault - tolerant project which aims at the fault - tolerant module of the parallel computer on satellite has been put forward, and the augmentative of circuit that project design realization need is little, this project can avoid any breakdown of any part logic circuit of the fpga

    本課題主要針對星載并行計算機體系結構及軟體結構的特點,從如下三個方面進行了容錯控制理論研究和實踐工:首先進行了基於星載多cpu并行計算機體系結構的系統級容錯模型研究,提出了一種多cpu冷備份容錯模型和一種多cpu熱備份容錯模型;然進行了基於rtems系統的軟體容錯技術研究,提出了任務級容錯調度演算法以及基於檢查點技術的系統級容錯恢復機制和策略,同時研究了利用系統重注入進行軟體在線自修復的容錯技術;研究了基於fpga的部件級容錯技術,提出了對容錯模塊這一星載并行計算機關鍵部件的兩級容錯方案,實現該方案所需增加的電路少,可避免板級晶元以及fpga晶元內部任何邏輯發生單點故障。
  2. A rabbit was infected with a cloned yntatl, blood was collecting from from the rabbit every 3 days after infection within 30 days, 10 clonal trypanosome populations were gotten, infecting a new rabbit by the last non - cloned trypanosome population. repeated above all, thus infected 5 rabbits sequentially. twenty different vats ( variant antigen type ) were monitored and characterized from those fifty mono - clonal populations by indirect immunofluorescence test ( ift ) and avidin biotin enzyme immunoassay ( abc - eia )

    用伊氏錐蟲雲南水牛單克隆株yntat1感染兔,感染后30天內,每3天從兔血中分離錐蟲並單蟲克隆,一個未單蟲克隆的蟲株感染另一隻兔,重復以上,這樣順序感染5隻兔子,共獲得50個單克隆錐蟲種群( tp ) ,經間接免疫熒光和abc酶標試驗鑒定共為20個抗原性互不相同的抗原變異體( vats ) 。
  3. At last, by making comparison of the simulation results between uninstalled abs and installed abs, the biggish bestead of abs to braking ability and direction stability of vehicles was certified. it proffers a theoretical thereunder to in general use abs in vehicles

    ,本文對轉彎制動時未安裝abs和安裝abs兩種情況的模擬結果了比較,證明了abs對提高車輛的制動性和縱穩定性有很大幫助,為abs在汽車上的普遍安裝提供了理論依據。
  4. The final operation in propellant manufacture is the curing of the binder.

    製造推進劑的最後操作是粘合劑的固化。
  5. Chain, which is the law of the underwater world, to see how fish is the last of the great whales eat ! operations guide : use a mouse and move around from top to bottom fish, get a certain number of fish will become, eventually get enough points to move on to the next concern

    大魚吃小魚,這是海底世界的定律,看看小魚是怎麼吃掉大鯨魚的吧指南:使用鼠標上下左右移動小魚,吃到一定數量的魚會變大,吃到足夠分數進入下一關。
  6. Introduction : chain, which is the law of the underwater world, to see how fish is the last of the great whales eat ! operations guide : use a mouse and move around from top to bottom fish, get a certain number of fish will become, eventually get enough points to move on to the next concern

    大魚吃小魚,這是海底世界的定律,看看小魚是怎麼吃掉大鯨魚的吧指南:使用鼠標上下左右移動小魚,吃到一定數量的魚會變大,吃到足夠分數進入下一關。
  7. Finally with an ensample of sale subsystem of yz - erp, the operating and realizing processes of the system are present. these analyzed and proved the feasibility and practicability of the mvc mode

    以yz - erp銷售子系統的一個功能模塊(銷售合同管理功能模塊)為例,描述系統實現過程,分析並證明了設計模式的可行性和實用性。
  8. Considering that the enterprise cannot research the " customer - enterprise " value deeply, on the basis of that, the paper puts forward evaluating system of customer value in the enterprise according to value contribution, applies ahp to analyze weight of the indexes in consultation with marketing management and selling personnel of the enterprise and relevant experts and then exert clustering analysis and sas software to classify the customers according to the current value and potential value, provide the strategies of the customer classification management. in addition, any resource is exiguity, including economical resource. this paper defines economical resource, puts forward the model of optimum distributing resource and utilizes the method of linear regress equation to get result, which to grope for a new method about calculating marketing expenditure

    本文首先界定了客戶和客戶價值的含義,同時闡述了關系營銷中客戶價值的理論以及客戶價值的影響因素,針對目前「客戶?企業」價值的研究還不成熟的研究現狀,以及現實中還沒有定量分析客戶價值大小的方法,本文提出了一套具有可性的客戶價值評價的指標體系,對客戶可以進行比較全面的、多角度的評價,同時採用ahp法對這個評價體系中的各指標因子賦以合理的權重,然運用聚類分析法和sas統計軟體對客戶群進行了科學地細分,在此基礎上幫助企業制定出不同細分客戶群組的營銷策略;除此之外,考慮到目前企業對于營銷資源的合理分配問題還沒有進行過深入地討論,本著企業經營的根本目的是盈利的原則,論文結合經濟學原理以及計量經濟學中的多元線性回歸分析提出了實現利潤大化的營銷資源配置的優化模型,旨在探索一種銷售費用優配置的方法。
  9. The article points out the importance and necessity of the information - security from its actuality in our country. the resources in the information system, for instance, hardware, software, data, document, operator, meterial and so on, are evaluated and gived safety grade firstly. and then, it analyses the menace including the nonauthorized access, the information leak, the refused sevice, the internal objection which the system will take. the following are the corresponding control police : confirm the users " rights and duties, including the mode of using account, the limit of accessing resource, the application of password, the building of backup ; confirm the administrators " right and duties, including physical safety, system configuration, account configuration and usufruct, password management, audit and control, backup and individual intimity ; run - of - mill measure of security defence, including access control, symbol and identification, integrality control, password technique, firewall system, audit and resumption, safety of operating system, safety of database system, defence of computers " virus and resisting - deny protocol. in the end, the article offers the strategies of disposing the safety - accident and analyse after ithow. to report it, how to solve it in phase, and how to avoid it happening again. in a word, the article presents a holistic resolvent about keeping away the information system ' s security, and supplies a essential frame for its configuration, management and application

    ,對系統可能受到的威脅,包括非授權訪問、信息泄漏、拒絕服務和內部缺陷等進行分析,並提出了相應的控制策略:確定用戶的權力和責任,包括帳戶使用方式、資源訪問權限、口令應用以及建立備份等;確定系統管理員的權力和責任,包括物理安全、系統配置、帳戶設置及使用權限、口令管理、審計和監控、備份以及個人隱私等方面;一般性的安全防護措施:存取控制、標識和認證、完整性控制、密碼技術、防火墻系統、審計和恢復、系統安全、數據庫系統安全、計算機病毒防護和抗抵賴協議等。,對事故處理和事分析提供策略,如何報告安全事故,如何協調解決安全事故,如何避免安全事故再次發生。總之,本文對信息系統安全防範工給出一個整體的解決方案,為其在配置、管理和應用方面提供了基本的框架。
  10. It is demonstrated by simulations that the control method is efficient and the fully cartesian coordinates is practically efficient. then the inverse kinematics of dual free flying space manipulator are mainly discussed in the third chapter, and the jacobean matrix for dual manipulator space robot is derived by fully cartesian coordinates, a control method for space manipulator based on the resolved motion rate control concept is proposed. then, the computer simulation verifies the effectiveness of the algorithm

    首先,分析了閉環雙臂空間機器人捕捉目標物體時的運動學關系,給出了以完全笛卡爾坐標表示的系統運動jacobi關系;然,以此為基礎研究了空間機器人雙臂協調的分解運動速度控制方法和協調問題;應用matlab語言對平面雙臂空間機器人系統進行了計算機模擬、模擬,模擬運算證實了上述方法的有效性。
  11. Finaiiy, the paper also has introduced the virtua1 worid of windows rs ; j { ? # - - lase / and how to map the 1ogica1 address to physica1 address in protected mode and the interrupt mechanism of protected mode, then the paper has i11ustrated that it is necessary to write virtua1 device driver ( vxd ) in order to access hardware device from the third leve1

    ,在介紹了windows的虛擬世界,和在保護模式下如何將邏輯地址映射成物理地址,以及保護模式下的中斷機制的基礎上,闡明了在保護模式下應用程序對硬體設備驅動程序的必需的中間橋梁用。
  12. Information communication security, beijing, china, nov. 11 - 14, 1997, pp. 217 - 222. 11 michels m, p horster. on the risk of discruption in several multiparty signature schemes

    ,我們指出chen等人提出的方案不能抵抗內部攻擊的一個根本原因是在實際應用中,不能保證所有簽名者的「同時」 。
  13. Consequently, to operationalize strategic intent, top management set ‘ challenges ' that are of much shorter duration, yet contribute to the ultimate goal

    所以,為了使戰略意圖有性,高層管理人員需要建立短期的「挑戰」來達到的目標。
  14. 3. finally, according to the demand of the research project, the steganography programs downloaded from internet are integrated to be a practical system. it has simple and perspicuous interface, easy to operate

    我們將已經收集到的隱藏工具予以集成,對每個工具都有詳細的說明,並對不同的dos程序採用統一的輸入界面,形成一個系統的隱藏工具體系,其界面明了簡單,用戶可以很容易並掌握。
  15. Some typical schemes are implemented via this data structure ( loop subdivision, catmull - clark subdivision, do - sabin subdivision, hybrid subdivision, adaptive subdivision ). the technique of opengl is utilized to accomplish some basic operations, such as rotation, zoom, pan, pick and so on. finally the algorithms studied by our research group are integrated, and a prototype system based on subdivision surface is developed

    ( 4 )改進了適合於曲面細分的的翼邊數據結構,並實現了典型的細分演算法( loop細分、 catmullclark細分、 doo - sabin細分、混合細分、自適應細分) ;採用opengl技術實現了旋轉、縮放、平移、拾取等圖形的基本幾何將本課題組研究成果加以集成,開發了一個基於細分曲面的原型系統。
  16. In the final part, aiming at the problems that exist in status replacement of employees of state - owned, the writer brought forward some solutions to these problems and pointed out that china should both consistently boost transformation of state - owned enterprises and guarantee the basic rights for the employees of transformed enterprises by intensifying restriction of law to realize unmerciful transformation and merciful operation and practically settle the troubles back at home for the employees and accordingly achieve the original intention of transforming the state - owned enterprises, keeping the society to be stable and boosting economic development

    文章部分,針對國企職工身份置換存在的問題,提出了解決這些問題的建議,並指出我國既要堅定不移地推動國企改制,又要通過加強法律的約束以保障改制企業職工基本權益,實現無情置換有情,切實解決職工的后顧之憂,從而實現國企改制保持社會穩定、促進經濟的發展的初衷。
  17. In fact, the protection of shareholders ' rights to dividends has foundation by way of analyzing the two kinds of characters, that is prospecting rights and vesting rights ; the realization of shareholders ' rights has solid basis by way of reconstructing the concept and means of company ' s profits allocation ; the study from the perspective of the cost of tax and investment make the allocation of dividends more practical ; the system of legal liability is the last safeguard

    實際上,通過解析股利分配請求權的兩種權利屬性期待權和既得權,該項股東權的分層次保護獲得了依據;通過重構股利分配的公司利潤基礎以及利潤分配方式等提供了該項股東權實現的充實基礎;稅收成本以及資本投資性質的研究角度使股利分配更具有可性;而法律責任機制的完善是一道保障。
  18. Games suggest that the mouse operations to the top of the two wires staggered to avoid wye octopus - themselves, then angered octopus, neighbors became crutch with crutch laser pointing octopus, xiao yang yang, chimpan

    游戲提示,鼠標,將上面的兩個電線交錯,免得懷章魚電到自己,然激怒章魚,鄰居成了拐棍,用拐棍將激光指向章魚,撓癢癢,猩猩笑。
  19. Carrying out the data nbank meter scan, the affix that record, delete and modify, report of born, carried out the synthetase working of the polypeptide data nbank meter, carry out many conditions inquire and blurrings inquire, and vivid carried out the paraquinones and can ' t renew the renewal that inquire as a result gather working, carried out the lord to operate from the table, carry out the secret code maintenance function, ultimately, system can also with the guide data nbank with steer the working to the ad libitum and the data nbank of the structure

    實現了數據庫表的瀏覽,記錄的添加、刪除和修改,報表的生成,實現了多數據庫表的連接,實現了多條件查詢和模糊查詢,並靈活實現了對不可更新查詢結果集的更新,實現了主從表,實現了密碼維護功能,,系統還可以導入數據庫以對任意同結構的數據庫進行
  20. It ' s reflected in four aspects : teaching target, teaching resources, teaching tactics and teaching assessment. the determination of teaching contents is the emphasis, and the teaching contents is determined by teaching target ; the collection of material ( teaching resources ) is the difficulty - compose a script after making a careful study of the teaching material, then collect the material according to the script ; teaching tactics are embodied by the determination of information form and by the way in which the contents accord with the form so as to get the best result in teaching ; making teaching assessment guarantees the quality of the software. in the early making period, the original model method of system engineering is adopted to produce small experimental courseware and a further revision and improvement are made in consultation with some experts. also an agreement on the demand of the software system is reached. in the later making period, the software is appraised by experts from its stability, serviceability reasonableness of construction, and the scientific nature of contents, then it is put into use as an experiment. finally those who use it are required to fill the teaching feedback table

    教學設計理論是靈魂,它貫穿于整個軟體編制過程,從四個方面來體現:教學目標、教學資源、教學策略、教學評價。教學內容的確定是重點,根據教學目標來確定教學內容;素材的收集(教學資源)是難點,在鉆研教材的基礎上撰寫腳本,根據腳本去收集素材;教學策略體現在信息形式的確定,以及如何使內容與形式協調一致,達到教學優化的效果;而進行教學評價是本軟體質量的保證,在軟體的製的初期,採用系統工程論的原型模型法,開發出實驗性小課件,在徵求專家的意見的基礎上進一步修改、完善、確認軟體系統的需求併到達一致的理解,在軟體製期,再請專家從軟體的穩定性、可性、結構的合理性、內容的科學性等方面進行鑒定,將軟體實驗性投入使用,再讓實驗對象填寫教學反饋信息表。
分享友人