格形構架 的英文怎麼說

中文拼音 [xínggòujià]
格形構架 英文
cancelled structure
  • : 格象聲詞rattle; gurgle
  • : Ⅰ動詞1 (構造; 組合) construct; form; compose 2 (結成) fabricate; make up 3 (建造; 架屋) bui...
  • : Ⅰ名詞1 (用來放置東西或支撐物體等的東西; 架子) frame; rack; shelf; stand 2 (毆打; 爭吵) fight;...
  • 構架 : carcass; panel work; frame; buck; blind; reinforcement; thripple; backbone; framework; truss; fra...
  1. In this diploma thesis, the statistic and structural characteristic of musical score image is analyzed and synthesized by relevant technology of image project, pattern recognition, mathematical morphology, software engineering, music knowledge, midi and so on. the concept of direction number has been defined, and then the mathematical morphology theory is used to process musical score image and recognize musical information. specialized direction number algorithms are firstly used to preprocess a musical score image and then recognize stafflines, barlines, pitch, note values, clef, etc. finally the musical information of the musical score image is automatically stored in the midi format

    本文利用圖像處理、模式識別、數學態學、音樂知識庫與midi等相關技術,分析與綜合數字樂譜圖像的統計與結特徵,提出了方向數等概念,對樂譜圖像進行處理,利用直方圖技術與方向數演算法識別譜線、小節線、符乾等樂譜的主要框,然後用數學態學理論識別音高與時值,最後根據這些音樂信息,組合成音樂樂譜信息,並自動轉化成midi式。
  2. Lattice towers and masts - code of practice for strength assessment of members of lattice towers and masts

    和桅桿.和桅桿件的強度評定的實施規程
  3. In the framework of the generative grammar, the government and binding theory provides us evidence of the classification of these sentential types semantically and syntactically : the argument structure and epp determine the obligatory elements at the sentential level, morphological rules and the case theory motivate the production of some derived sentence types

    生成語法管約論框內分析了劃分的語義和句法依據,謂詞的題元結和epp決定了句子層面的必有成分,同時態規則的作用和滿足理論還會推導出一些衍生句式。
  4. The first set of estimated values describes a given formal style while the rest serving as weighting mechanisms, an importance index and a confidence factor, fine - tuning the description

    第二部份乃描述一個設計師可藉以分析現有造並可界定及描述目標市場所期望的造
  5. In computation of swept volume approximation, an improved technique to generate the swept volume approximation for arbitrary meshes is presented by introducing generator simplification and path resample using frenet moving frames along the discreted sweeping trajectory. other steps, such as a directed distance field computation on a uniform grid based on the hardware accelerated computation technique and iso - surface extraction using marching cubes algorithm, are also included in this algorithm. in addition, the simplification scheme and smoothing technique are applied to the swept volume generated from iso - surface extraction

    本文的主要貢獻在於:在掃描體逼近計算方面,在原有任意多邊模型沿任意路徑運動生成掃描體逼近演算法的基礎上,提出了加入對掃描母體簡化的預處理和用活動標對掃描路徑進行重采樣等過程,演算法的其它過程還包括:計算掃描體中幾何基元的排列,用硬體加速造無符號的有向距離場,將無符號距離場轉化為有符號距離場,從有符號有向距離場提取等值面等。
  6. With a long - term view, china is constructing a reasonable framework of productivity layout and industrial structure in an effort to form an industrial development pattern featuring the interaction between urban and rural areas

    從長遠考慮,中國正在建合理的城鄉生產力布局和產業結成城鄉互動的產業發展局。
  7. The ore - hosted strata of xitieshan lead - zinc ore deposit is located in a limb of a anticline and suffered from deformation partition

    摘要錫鐵山大型鉛鋅礦床含礦巖系的位於背斜的一翼,普遍遭受變分解作用。
  8. Thus, it is very important to study the mesozoic structure in the north segment of the yiwulushan mountains, western liaoning province and its controlling over the enrichment and distribution of gold deposits

    因此,對遼西醫巫閭山北段中生代及其對金礦成富集與分佈的控製作用研究具有重要意義。
  9. Based on first - hand materials, five regional faults ( nandan - du ' an fault zone, nanpanjiang fault zone, youjiang fault zone, bama fault zone and xialei - lingma fault zone ) were analyzed systematically which controlled the structural framework of the whole area. through discussing their activity and controlling basin behavior in different stage, fault zones " expression forms, and the activity mechanism of different section in different stage

    論文在豐富的野外第一手資料的基礎上,對控制全區的五條區域性斷裂(南丹?都安斷裂帶、南盤江斷裂帶、右江斷裂帶、巴馬斷裂帶和下雷?靈馬斷裂帶)進行了系統的分析,討論了它們的造表現式、不同時期斷裂的控盆作用,並探討了它們不同時期不同段落的運動學機制。
  10. By having conducted 40ar - 39ar dating of 35 samples and sm - nd dating of 19 samples from the linzizhong volcanic rocks, the post - collision volcanic rocks and a granite dike and the yarlung zangpo ophilite, the dissertation provides significant new data and results for optimizing the time framework of tectonic - magmatic event s of this region. according to isotopic dating of 9 samples, 12 experiments survey in the main trunk profile, the eruption age of the linzizhong volcanic rock in the linzhou basin has been determined as 54 - 64ma

    本論文通過35個樣品的~ ( 40 ) ar - ~ ( 39 ) ar及19個樣品的sm - nd同位素測年,獲得了關于俯沖?碰撞階段成的林子宗火山巖、后碰撞火山巖與花崗巖及雅魯藏布蛇綠巖的同位素年齡數據,為完善研究區造?巖漿事件的時間提供了新的資料與成果。
  11. Abstract : a optimum design method in which the optimum shapes and dimension of cross sections are selected to minimize the structural volume and get the global optimum solution, is presented first by means of the method of the genetical gorithm. the numerical results show that the model is valid

    文摘:利用遺傳演算法,首次提出「取剛截面狀和尺寸規為設計變量,結體積為目標函數,求全局最優解」這一優化模型.通過對各個計算環節的研究,確立了可行的計算方法,編制計算程序,並以算例證明該方法的有效性
  12. The anatomy of small - scale to meso - scale deformational structures have resulted in the reconstruction of the structural framework of the yanbian group. the statistical analyses of the fold hinge and cleavages developed in the yanbian group suggest the trend of the first stage penetrating structures of the yanbian group is een - wws. 2

    基於對鹽邊群中、小尺度變造進行造解析,建立了區域,通過對褶皺樞紐和劈理的分析,提出鹽邊群第一期透入性變造的走向為北東東?南西西向。
  13. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上網資審查;針對網路安全審計,重點研究了網路安全審計分散式模型以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行式化描述,提出了一種基於自然演繹系統的動態安全審計策略模型dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該模型的定義和推演演算法;通過深入研究非法外聯的關鍵技術和檢測模型,提出了基於路由表查找的c / s的非法外聯檢測模型;針對病毒檢測,提出了基於主機的防病毒檢測思想,在客戶端進行病毒防護。
  14. From the meaning of function, road is the skeleton of the city. the network configuration of city road determines city ’ s form and structure. the total capacity of city road determines city ’ s circulation gross of people, material and information

    從功能意義上看,城市道路是城市的骨,城市道路網路局決定著城市的態與結,城市道路總體容量決定了城市人流、物資流、信息流的運行總量,因此城市道路在城市運行中起著十分關鍵的作用。
  15. 二 、 construction project organization latticed frame ( shell ) installation enterprise should set up project site organization institution adapted to project construction activities firstly before constructing and installing in the site, through discussing the designed principle and basis of construction project organization, the step of construction item organization of space grid structures are related as follows : project analysis, object working, agency and function determination, personnel and duty definition

    二、施工項目組織管理網(殼)安裝企業在現場施工安裝前,首先應建立與工程項目施工活動相適應的項目現場組織機,通過對施工項目組織式設計的原則和依據論述,給出了網施工項目組建的步驟:項目分析;目標劃分;工作劃分;確定機及職責;確定人員及職責。
  16. Second, emphases were put on set authentication research, an architecture of set authentication was proposed to expound the intelligent architecture design theory fitting with layered model. then, with displaying the protocol model, the process control principle was analysed, and more attention was taken to discuss the mathematic model of rsa algorithm and integration of various model methods, to give the component model based on main - program / sub - process architecture family and formalized description. next, by establishing the usercase model, activity model, object structure model and sequence model in order, and based on the data model, a lot of measure were taken to optimize these models. finally, the main framework of set authentication in acme template was given, with the java implement and aop implement for typical applications together

    然後重點對set認證的領域模型進行了研究與分析,提出set認證的領域框,闡述了與層次模型相適應的智能軟體設計思想;進而提出set認證的協議模型,分析其過程式控制制原理,並且進一步探討了rsa安全演算法的數學模型和多種建模機制的綜合應用,給出基於主程序/子過程體系結式描述的件模型。在依次建立set認證的用例模型、活動模型、對象結模型、順序模型的基礎之上,分析得到了系統的數據模型,然後使用多種手段對模型進行優化。最後給出了set認證系統主要框的acme描述,以及set認證系統中的典型應用的java實現和面向方面實現。
  17. According to pkpm ' s general request, we have done primary development of the pre - process part and the post - process part of space - grid structure cad program in cfg graphic supporting system with object - oriented program language c + +. we have completed twenty - four kinds of modeling of normal space - grid structure and partial work of post - process part. finally, credibility of the system is verified by calculating examples

    依照pkpm的總體布局要求,採用面向對象的程序設計語言c + + ,在cfg圖平臺上進行了空間網計算機輔助設計前、后處理的初步開發,完成了二十四種標準網、網殼的前處理建模及一部分后處理工作,並選用例題對程序進行了驗證,表明程序能提供方便實用的前、后處理功能,結計算分析結果是準確可靠的。
  18. In view of above problems, this article studies the key technology of mass data processing system, and design a system framework point to the triangle mesh data, which is made up of millions series of triangles. this framework resolves the problem that a computer could not read all the mass data into its storage and process them through data block partion, and also reduces the space that mass data occupies in hd by data compression

    針對以上問題,本文研究了海量數據處理系統的關鍵技術,針對由百萬級數量的三角成的三角網數據,設計了一個系統框,通過數據分塊解決計算機不能把海量數據全部讀入內存進行處理的問題,通過數據壓縮解決海量數據佔用大量硬盤空間的問題。
  19. Chapter one introduces the recent development of usb2. 0 and the overall architecture of transceiver interface ; chapter two proposes the design flow and design style ; chapter three presents the whole system and module partition ; chapter four emphasizes on the dual - mode transmitter circuit, and gives out the simulation waveforms ; chapter five focuses on the design of over - sampling receiver and dll ( delay locked loop ) module ; chapter six designs the band - gap reference circuit. in the end, it concludes the design, and estimates the trend of usb. the dissertation is emphasized on dual - mode transmitter architecture, implementation of high speed dll using dba ( digital - based analog ) technology and a new design methodology for complex digital modules in mixed - signal circuit

    本文第一章介紹了usb2 . 0的發展現狀和收發器介面晶元系統;第二章介紹了該晶元的設計流程和風;第三章介紹了該介面晶元的總體以及模塊劃分;第四章著重介紹雙模發送器電路設計並給出了模擬驗證波;接下來第五章分析了過采樣接收器的設計並對其中的dll ( delaylockedloop )模塊設計進行了詳細的分析;第六章介紹了本晶元內置的基準電壓源的設計;最後對本文的設計一個總的回顧和總結,並展望下一代usb的發展方向。
  20. This article take the concept that " the transnational relations " which proposed by robert o. keohane and joseph s. nye as the basic theory starting point, and this concept forms the sharp contrast with the traditional theory of " the national center principle " ; and take three kinds of transnational behavior bodies which proposed by

    本文以與傳統的「國家中心主義理論」成鮮明對比的由羅伯特?基歐漢和約瑟夫?奈提出的「跨國關系」的概念為基本的理論出發點;以瑪麗特? e .凱克和凱色琳?辛金克所提出的三類跨國行為體為基本的內容
分享友人