最後過濾 的英文怎麼說

中文拼音 [zuìhòuguò]
最後過濾 英文
after filtration
  • : 副詞(表示某種屬性超過所有同類的人或事物) most; best; worst; first; very; least; above all; -est
  • : 過Ⅰ動詞[口語] (超越) go beyond the limit; undue; excessiveⅡ名詞(姓氏) a surname
  • : 動詞(除去液體雜質) filter; strain
  • 最後 : last; final; ultimate
  • 過濾 : [工業] filter; filtrate; screening; colation; filtration; filtering; lautering; colating; straini...
  1. And then, metal structure with aspect ratio 30 was obtained in our laboratory. eventually, a few micro parts with high aspect ratio were fabricated by liga process under the optimum condition. there were key parts of micro thruster, netlike nickel antielectron modulator, micro copper radiator, stainless steel micro components and many filter mediums with different shapes and dimensions

    ,我們利用liga技術加工的獨特優點,以發展其高深寬比技術的實際應用,先製作了狹縫陣列鎳結構微推進器關鍵部件、薄壁網狀多孔鎳結構正電子慢化體、微型銅結構換熱氣和多種材料不同、尺寸各異的介質,還結合利用liga技術和微細電火花技術的加工優點,製作出了不銹鋼微結構
  2. The intrusion detection system chooses the misuse detection technology. the main content of the paper is divided into four sections : section 1 mainly explores the windows network architectonics, analyzed the program of ndis, and introduced the main network data capture schema of lower layer ; then introduced the mechanism of packet capture and filter, and analyzed the framework of winpcap in capture and filter packet on the bases of former work

    本論文主要包括四個方面:第一部分主要分析了windows的網路體系結構,剖析了網路驅動介面規范( ndis )的編程,介紹了低層網路數據的主要的捕獲方案:然介紹了包捕獲和機制;在前兩者的基礎上,分析了本系統開發用工具winpcap數據包捕獲和的的結構。
  3. By using the processing method of sliding time window, the problem of the periodicity range ambiguity is solved. meanwhile, the problem of range ambiguity which is produced because the range of target is biger than the maximum range of radar is also solved by using this method. then, the pulse width parameter which is the most important in the parameters of fmicw is analyzed. the stricter restrict is given to ensure the range spectrum has only one beat frequency after signal processing. at last this thesis introduces the different signal processing methods of fmpcw and fmicw

    同時利用該方法解決了fmpcw信號的由於目標距離超雷達的大單值測距范圍而引起的距離模糊問題。然對fmicw波形參數中為重要的脈沖寬度進行了分析,給出了更為嚴格的約束條件,保證了信號處理后距離譜峰值的唯一性。,分別介紹了fmpcw和fmicw信號的不同處理方式,並對兩者不同的時域波性能進行了比較,並對二者的差異進行了分析。
  4. The temperature was about 60 degrees fahrenheit for the last leach.

    一次的溫度大約在華氏60。
  5. And finally, we come to the holy grail of spam filtering

    ,我們來到了聖杯的垃圾郵件
  6. The power ’ s quality is decided in the system performance, the amplifier has 4 groups ’ power sources, input 220v through the filter, the transformer transformation, the full - wave rectification, finally through manostat leveling off voltage, after the electric capacity filter outputs

    電源質量的好壞是決定系統性能的一個重要因素,放大器共4路電源,輸入220v通波,變壓器變壓,全波整流,三端穩壓器穩壓,電容波后輸出。
  7. Secondly, the steps of the glass ' s image processing are discussed in detail. based on the experiments and the characteristics of interference fringe, we pre - process the images with median filter and image segmentation with dynamic threshold. after marking and thinning the resulted fringes, we analyze linearly the unifor mity of product ' s samples with the characteristics of the framework

    ,結合檢測系統中玻璃干涉圖像處理的任務,詳細介紹了處理的各個步驟:通實驗比較,並結合干涉條紋圖像的特點,選擇中值波、動態閾值分割等技術對圖像進行預處理;然對獲得的二值條紋進行標記、細化,提取條紋骨架;,用骨架的特徵進行線性分析,識別條紋的類型,判斷玻璃樣品的均勻性。
  8. It is neither filtered nor pasteurized

    既不也不經巴氏消毒。
  9. Single packet filter technology, with its flaws, cannot provide perfect security protection ; intrusion detection, as an active defense system, is a crucial supplementary to the packet technology and work as a second line of defense ; content filter supplies the gap of the information content protection that two former technologies leave and form the last barrier for security protection

    單純的包技術由於其自身的缺陷而不能提供完全的安全保護。入侵檢測作為一種主動防禦技術,是包的重要補充,起到了第二道防線的作用。內容彌補了前兩種技術在信息內容防範方面的不足,形成了安全防護的一道屏障。
  10. Briefly, the method includes four steps : culturing a sample to the maximum growth of autochthonous microorganism, filtering to remove the original biomass, inoculating the filtrate with certain kind of nitrogen fixing bacterium and determining the bacterial growth potential

    該方法主要包括4個步驟:將樣本在合適的條件下培養,讓土著微生物得到大限度的生長,然或離心去除初級生物量,在液中接入固氮細菌,並測定固氮細菌的生長潛能。
  11. At first, the paper confirms singular area by singular detection, then designs a series of low - pass filters that have different templates according to the different position in finger image for a local area, at last sets up gabor filter parameters according to the characteristics of fingerprint image. the improved enhancement algorithm has a better robust, and can preserve texture structure of singular area effectively. in binary noise clearance, the paper presents an algorithm that clears the biggish white speckles and black speckles

    在指紋圖像增強方面,本文針對傳統的基於gabor波器指紋圖像增強演算法魯棒性差以及通常會改變奇異區紋理結構的缺點,對原有演算法進行了一些改進:首先通檢測奇異點確定奇異區,然根據局部區域在指紋圖像中的位置構建相應取值方式的低通波器並對該局部區域方向圖進行波,根據指紋圖像紋線的特點對gabor波器參數進行設置。
  12. The carrier wave is modulated directly by the baseband signal at several frequency point in l band and s band. firstly, this paper clarifies the theory of i / q modulation, elaborates evm and acpl, and analyzes the effect of amplitude and phase unbalance and dc offset on evm. secondly we review the basic principle of phase locked loop and it ’ s composing parts, including the basic conception and design method of pll frequency synthesizer, especially introduce the charge pump pll frequency synthesizer in detail

    首先,在闡述i / q正交調制基本原理的基礎上,通對誤差矢量和鄰近通道功率泄漏的詳細分析,定性、定量地討論了各種非理想電路因素(如相位不平衡、幅度不平衡、直流偏差等)對調制器性能的影響;其次,介紹了鎖相環的工作原理和基本組成部分,包括鎖相環的設計和環路波器的設計,特別詳述了電荷泵鎖相頻率源;第三,介紹了採用直接調制技術模擬衛星信號的射頻前端的設計;,對整個直接射頻調制系統進行測試,結果基本上達到了課題要求。
  13. The equation including the nonlinear dispersion, i. e. the modified nonlinear schrodinger ( mnls ) equation, is a better model. in this thesis, we take mnls solitons as a model for femtosecond soltions. then based on the recently developed direct perturbation theory for perturbed mnls equation, we study the raman self - frequency shift of femtosecond solitons and its suppression by the means of frequency filters. for this purpose, first, we define the physical parameters of mnls solitons ; next, through the direct perturbation theory for perturbed mnls equation, under adiabatic approximation, we obtain the evolving parameters of mnls soliton on our questions and then choose the parameters of frequency filters based on it ; at last, we directly numerically simulated our questions by split - step fourier ( ssf ) method after improving the arithmetic of the differentiation of the nonlinear item for satisfying mnls equation

    本論文以mnls孤子作為光纖飛秒孤子的模型,通新近建立的mnls孤子直接微擾理論,研究光纖中由拉曼效應引起的飛秒孤子在傳輸中的自頻移,以及通頻率波對自頻移的抑制。為此,首先給出描述mnls孤子的各物理量,然用mnls孤子直接微擾理論,解析地得到這些問題絕熱近似下的孤子參數演化,並由此選擇頻率波的參數,用分步傅里葉方法,在對非線性項微商的演算法做出了適合於mnls孤子的改善,對拉曼效應及頻率波進行了直接數值模擬,其中頻率波參數用微擾理論確定。
  14. Through sedimentation, filtration and disinfection, the process of turning raw water into clean water required around 48 hours. though the filtration speed was slow, it provided a stable quality of water until its later replacement by faster working rapid filtration plants

    原水經沉澱消毒,變成清水,約需48小時,費時雖長,卻能供應水質穩定的自來水,日已被速更快的快場取代。
  15. Then it explains packet validation mechanism, connection maintaince, and with taking the system platform into consideration, design and implement a improved - syncookie model. at last, we design several performance test cases. the test cases show that the high - speed filter can protect away from the syn flood attack effectively, at the same time it has been much more improved than traditional protect ways on the filtering and processing capacity

    該文首先對國內外拒絕服務攻擊威脅以及研究現狀進行分析描述;然,從拒絕服務攻擊的方法分類、主要手段、常見的防禦及防範方法分析研究著手,提出了一種採用tcpproxy與待響應ack隊列相結合的能夠對tcp拒絕服務攻擊進行有效的方法,並用這種方法在linux內核中實現了一個高速器,進行了相關的性能測試。
  16. In the simulation work, one 1. 5kw and one 18kw induction motors ? control system were simulated and two simplified control scheme were proposed. when developing the program in tms320f240 dsp, this paper solved two practical problems : the finite - length effect and dc bias effect. finally, sensorless control system based on adaptive filter theory are tested on the platform of 1. 5kw induction motor, the results show that the scheme ? performance is good

    在模擬程中,針對1 . 5kw和18kw異步電機進行了模擬,並在此基礎上提出兩種簡化控制方式;在tms320f240的具體編程程中,分別對自適應波器的有限字長效應、直流偏置效應等非理想因素進行了修正和補償;,在1 . 5kw微型異步電機上進行了轉矩閉環無速度傳感器實驗,實驗結果表明了演算法完全可以達到預期的目標。
  17. In the course of image preprocessing, digital face images are captured with a numeral camera and these images are transformed to 8 bit from 24 bit. then the noise in face images are removed by using the method of median filter and the face images are binarized. finally the face in each face image are segmented with the method of integration projection, then standardized

    在圖像預處理程中,首先利用數碼相機獲取人臉數字圖像,然將24位圖像轉換成256級灰度圖像,並利用中值波的方法對圖像進行去噪處理,接著對圖像進行二值化處理,採用積分投影的方法將人臉分割出來並進行歸一化,終得到標準人臉圖像。
  18. There are three steps of the concrete process of the algorithm : initial localization, separating image and confirmation. firstly, single gaussian model is used to imitate skin - color distribution, meanwhile, skin probability images which is smoothly disposed using middle wave is calculated to attain the initial localization. secondly, in order to separate the latent face region, it uses multimodal information that includes the region growing 、 the hue and brightness 、 skin probability images etc. at last, it adopts the criterion of morphology analysis and face characteristic draw to confirm the latent region

    演算法的具體程主要分為三個階段:人臉初定位、人臉分割和人臉確認,首先採用高斯模型來模擬膚色分佈並構造出膚色概率圖進行人臉的初定位,並對膚色概率圖採用中值波進行平滑處理,接著利用區域生長準則和融合色度、亮度以及膚色概率圖等多源信息相結合的方法對圖像進行分割,以達到分割出潛在臉區的目的,採用人臉整體形狀的確認準則和人臉特徵提取的確認準則相結合的方法對潛在臉區的終確認。
  19. Finally, the filter must be aware of the fact that even though it is calling from kernel mode, the underlying fsd will continue to enforce sharing access against the file

    驅動必須能知道這種情況:雖然調用來自內核模式,下層的fsd會對這個文件強制進行共享存取。
  20. Firstly, frequencies of each mode shape are gained through frequency spectrum analysis of time domain signals of key points. secondly, time domain signals, which correspond to structural mode shapes, are gained through band - pass filter technology. lastly, the corresponding mode shapes of each natural frequency are constructed by using time domain signals, which are processed by band - pass filter technology

    該方法的基本思想是先通對關鍵點處時域信號進行譜分析得到結構各階振型對應的固有頻率,然帶通波技術得到結構關鍵點在每階固有頻率下對應的時域信號,波后時域信號構建結構在每階固有頻率下對應的振型。
分享友人