最後距離 的英文怎麼說

中文拼音 [zuìhòu]
最後距離 英文
final distance
  • : 副詞(表示某種屬性超過所有同類的人或事物) most; best; worst; first; very; least; above all; -est
  • : Ⅰ名詞1 (距離) distance 2 (雄雞、雉等的腿的後面突出像腳趾的部分) spur (of a cock etc )Ⅱ動詞...
  • : Ⅰ動詞1 (離開) leave; part from; be away from; separate 2 (背離) go against 3 (缺少) dispens...
  • 最後 : last; final; ultimate
  • 距離 : 1 (相隔的長度) distance; range; gap; space; spacing; separation 2 (相距) be apart from; be aw...
  1. By using the processing method of sliding time window, the problem of the periodicity range ambiguity is solved. meanwhile, the problem of range ambiguity which is produced because the range of target is biger than the maximum range of radar is also solved by using this method. then, the pulse width parameter which is the most important in the parameters of fmicw is analyzed. the stricter restrict is given to ensure the range spectrum has only one beat frequency after signal processing. at last this thesis introduces the different signal processing methods of fmpcw and fmicw

    同時利用該方法解決了fmpcw信號的由於目標超過雷達的大單值測范圍而引起的模糊問題。然對fmicw波形參數中為重要的脈沖寬度進行了分析,給出了更為嚴格的約束條件,保證了信號處理后譜峰值的唯一性。,分別介紹了fmpcw和fmicw信號的不同處理方式,並對兩者不同的時域濾波性能進行了比較,並對二者的差異進行了分析。
  2. The main work of the first part includes : introducing some methods of underwater sound positioning and analyzing their performance, analyzing the theory of measuring direction and distance of the target by three elements symmetrical and dissymmetrical array, comparing the measuring error of two kinds of array, and giving the theory of the generic arrays and discussing the phase wrapping and the distance wrapping in passive ranging

    對被動測技術的研究工作主要包括:簡單介紹了水聲定位的幾種方法,並對其性能進行了分析對比,分析了三元對稱陣和非對稱陣測向測的原理,對兩種陣型的測向測誤差進行了對比分析,還給出了一般陣型測向測原理,還對被動測向測中存在的相位模糊和模糊問題進行了探討。
  3. Coupling ? ? the area between the end of the rib cage and the beginning of the hindquarters

    這個部位位於一根肋骨到后驅前端的
  4. Finally, at long ranges, the blast wave becomes essentially a sound wave and its velocity approaches ambient sound velocity.

    ,在很遠的處,爆震波基本上就變成一種聲波,其速度已接近周圍的聲速。
  5. First, according to different car - following situation, warning distance model and braking distance model are discussed detailed. then according to base function to be achieved, system plan is made, and based on this, design of applying circuit of needed power unit, information collection unit, warning unit and other units is finished. system control program is designed by mcs - 51 language

    根據不同的跟車情況對報警模型和制動模型進行了深入的探討;然根據所要實現的基本功能,建立了系統方案,並以此為基礎,進行系統所需的電源、信息採集、警報輸出及其它裝置的應用電路設計;用mcs - 51匯編語言編制了系統控製程序;給出了模擬實驗的結果。
  6. At first, the text is segmented to words and converted to a sequence of part - of - speech tags ; then based on the pos tags sequence parameters and phrase - break distance information from training, markov model is used to get the most likely phrase break sequence

    首先,文本進行分詞,並轉換為一列由詞性標記所組成的序列;然使用馬爾可夫模型,利用人工標注數據庫訓練詞語連接處詞性標注序列的概率分佈和連接類型序列的信息,得到輸入的詞性標記序列對應的具有大似然概率的連接類型序列,利用后處理規則進行適當的糾錯。
  7. Because wake vortices can persist in calm air for several minutes ( extending for as far as eight miles ), the federal aviation administration requires minimum distances between aircraft, based on size

    機尾渦流可以在無風的空氣中停留幾分鐘,向延伸達12公里,所以美國聯邦航空總署按照飛機大小而規定了飛機之間的小安全
  8. At last, according to the national standard demands to coast down distance, and the national situation of automobile dynamic property test industry, the bench coast down distance revising model is set up and is proved by santana sedan

    ,本文根據國家有關標準對滑行的要求,結合我國汽車動力性檢測行業的實際情況,建立了室內臺架測量滑行的修正模型,並用小轎車桑塔納進行了驗證。
  9. The essence of edid is to set up a normal behavior fuzzy sub collection a on the basis of watching the normal system transfer of the privilege process, and set up a fuzzy sub collection b with real time transfer array, then detect with the principle of minimum distance in fuzzy discern method the innovation point of this paper is : put forward the method of edid, can not only reduce efficiently false positive rate and false negative rate, also make real time intrusion detection to become possibility ; have independent and complete character database, according to the classification of monitoring program, design normal behavior and anomaly behavior etc., have raised the strongness of ids ; use tree type structure to preservation the character database, have saved greatly stock space ; in detection invade, carry out frequency prior principle, prior analysis and handling the behavior feature of high frequency in information table, have raised efficiency and the speed of detection, make real time intrusion detection to become possibility ; have at the same time realized anomaly intrusion detection and misuse intrusion detection, have remedied deficiency of unitary detection method

    這種方法的實質是在監控特權進程的正常系統調用基礎上建立正常行為模糊子集a ,用檢測到的實時調用序列建立模糊子集b ,然用模糊識別方法中的原則進行檢測。本文的創新點是:通過對特權進程的系統調用及參數序列的研究,提出了基於euclidean的入侵檢測方法edid ,不僅能有效降低漏報率和誤報率,而且使實時入侵檢測成為可能;設計有獨立而完整的特徵數據庫,根據被監控程序的類別,分別設計正常行為、異常行為等,提高了檢測系統的強健性和可伸縮性;特徵數據庫按樹型結構存儲,大大節省了存儲空間;在檢測入侵時,實行頻度優先原則,優先分析和處理信息表中的高頻度行為特徵,提高檢測的速度和效率,使實時入侵檢測成為可能;同時實現了異常入侵檢測和誤用入侵檢測,彌補了單一檢測方法的不足。
  10. The new ways that solve multiple objectives decision making under risk into probability permanent type : decision making diagram method, matrix analysis method, multiple objectives markov method, the shortest distance method, successive type variation multiple objectives decision making under risk method and fuzzy analysis decision making method. 3. the new modes that solve multiple objectives decision making under risk into probability interval type and uncharted type : weighted method and sorting method 4 the new repent average value criterion that handle multiple objectives decision making under risk into probability uncharted type and generalizing the criterions that have been used into one objective decision making under probability into uncharted type to multiple objectives decision making under probability into uncharted type. 5. giving the error analyses method and decision result regulating method that been used into multiple objectives decision making under risk

    2 、探討了『決策圖法』 、 『矩陣法』 、 『多目標馬爾科夫法』 、 『法』 、 『連續型變量的多目標風險型決策法』和『模糊分析決策法』等解決概率固定型的多目標風險型決策的新方法。 3 、探討了『加權法』 、 『排序法』兩種解決概率區間型和未知型的多目標風險型決策的方法; 4 、在概率未知型的多目標風險型決策中改進了『悔值準則』 ,提出了『悔均值準則』 ;並將單目標概率未知型風險型決策的準則推廣運用到多目標概率未知型的風險型決策中去; 5 、探討了多目標風險型決策方法誤差分析及決策結果值調整的方法。
  11. Finally this paper propose the structure diagram of adaptive distance protection based on neural network impedance relay, which describes entire logic procedure from data acquisition unit to trip unit

    提出基於神經網路阻抗繼電器的自適應保護結構框圖,描述從信號採集單元到動作出口單元的整個邏輯過程,並對自適應保護的前景作出展望。
  12. In the end, the system experiments were conducted, and the results show that the system can be used for short - distance ranging

    採用延遲線閉環系統聯調,實驗結果表明所設計的測方案能夠用於近測量,差頻信號頻率反映了信息。
  13. Flying distance farther, the players score higher. the main game is to work out the techniques oppor 4455 penguin home run games

    每次揮棒結束,在游戲給出,按下一旁的「 ok 」按鈕,即可再次游戲。
  14. This thesis explains the necessity of the character recognition technology of the computer at first, describe the meaning in which the handwritten numeral discerns ; pretreatment technology of handwritten numeral recognition, including two value, line segmentation, word segmentation smooth, removing noising, standardization and thinning are discussed two value concretely discusses whole threshold value, some threshold value, dynamic threshold value and utilize space information to carry on threshold, which are several kinds of common method of choosing threshold value, especially utilize space information to carry on threshold value is describe in detail ; adopting to the foundation of thinning based on mathematics morphology, thinning algorithm of serials same and thinning algorithm of protecting shape are discussed ; afterwards, according to principle ' s diagram of the on - line character recognition, by analyzing the structure feature of the handwritten numeral, this thesis has proposed the online recognition te chnology of the free handwritten numeral based on the stroke feature and the online recognition technology of the free handwritten numeral based on the multistage classifying device. detail narrated noise removing, stroke characteristic definition and discernment, distance criterion of whole word match ; then under the foundation of handwritten numeral segmentation, off - line handwritten numeral recognition is researched. especially minimum distance classifying device, tree classifying device and adaptive resonance ( art ) network classifying device is discussed at the same time, believes degree analyses are introduced to integrate a lot of classifying devices ; at the end, the typical application of the handwritten numeral recognition was briefly narrated, its application in extensive data statistics, financial affairs, tax, finance and mail sorting have been explored

    二值化時對整體閾值二值化、局部閾值二值化、動態閾值二值化和利用空間信息進行閾值選取幾種常用的閾值選取方法進行討論,特別對利用空間信息進行閾值選取進行了詳細論述;在對通過對基於數學形態學的細化的基礎上,討論序貫同倫形態細化演算法和保形的快速形態細化演算法;然依據聯機字元識別原理框圖,分析了手寫數字的結構特點,提出了基於筆劃特徵的任意手寫數字在線識別技術和基於多級分類器任意手寫數字在線識別技術,對其中涉及的筆劃識別前的噪聲處理、筆劃間特徵量的定義及識別、整字匹配的準則進行了詳細敘述;繼而在對手寫數字的分割的基礎下對脫機手寫數字識別進行了研究,對基於分類器字元識別、基於樹分類器的字元識別、基於自適應共振( art )網路的字元識別分別進行了詳細討論,並引入置信度分析將多個分類器進行了混合集成;簡單闡述了手寫數字識別的典型應用,對其在大規模數據統計、財務、稅務、金融及郵件分揀中的應用進行了探索。
  15. The eminent dutch management researcher, greet hofstede, made investigations twice for ibm corporation. he classified four major dimensions in work - related value by means of a statistic analysis of the data collected. basing on hofstede ' s theories and by comparing with those of other researchers, we can possibly identify some of the major dimensions along which cultures differ

    荷蘭著名的管理研究學者霍夫斯泰德( greethofstede )為美國通用機器公司( ibm )主持的調查共進行了兩次,對搜集的資料進行統計分析,出價值觀念對比的四個尺度,根據hofstede提出的理論並比較其他學者的成果,得出以下四個重要的對比尺度,即個人主義?集體主義,對權力的態度,對不確定因素的迴避程度,以及成就?關系。
  16. The results indicate that after the beam has propagated for a minimal distance in gain media the modulation begin to increase and after the beam has propagated for a maximal distance in loss media the modulation stop increasing

    研究表明,對于增益介質,當光束傳輸到某個,小尺度調制才會增長;而對于損耗介質,當光束傳輸到某個,小尺度調制就停止增長。
  17. Secondly, the genetic algorithm is employed to calculate the minimum distance between two general nurbs surfaces

    ,運用遺傳演算法給出了任意兩張nurbs曲面之間的求解。
  18. At last, svm algorithm has been applied to remote sensing image classification. compared with k near neighbor and adaptive min - distance algorithm, the experience result presents that svm algorithm has better classification effect. and the experience result also shows us that svm algorithm has good application foreground in the aspect of remote sensing image classification

    將svm演算法應用到遙感圖像的分類,通過與自適應法和k近鄰法的實驗結果進行比較,得出svm演算法具有更好的分類效果,也說明了svm演算法在遙感圖像分類方面具有很好的應用前景。
  19. Based on data generated, we classify 8 recipients into three categories in terms of possible environmental impact : ( 1 ) low risk of gene flow to common cultivars ; ( 2 ) intermediate risk to common wild rice with same aa genome ; ( 3 ) high risk to ms lines. 2. development of a specific database for toxin and anti - nutrient proteins bioinformatics is a very useful tool for risk assessment of gm foods

    從轉基因水稻的環境風險考慮,轉基因向常規稻的基因漂流頻率及都較小,相應地其風險也較低;向不育系的基因漂流頻率較高,大漂流也較大,相應地其風險也較高,應重點考慮轉基因漂流對雜交稻制種純度的影響及其可能引起的環境風險果;轉基因向普通野生稻的基因漂流頻率中等。
  20. In addition, clove communication rapidly structured customer services centers in every province and 300 maintainance maintain stations all over the nation

    與此同時,深愛通信在全國建成40餘家省級客戶服務中心, 150家地市級客戶服務分中心,讓消費者在和時間內享受深愛手機的售服務。
分享友人