標準擊數 的英文怎麼說

中文拼音 [biāozhǔnshǔ]
標準擊數 英文
bogey
  • : Ⅰ名詞1 [書面語] (樹梢) treetop; the tip of a tree2 (枝節或表面) symptom; outside appearance; ...
  • : Ⅰ名詞1 (標準) standard; guideline; criterion; norm 2 (目標) aim; target Ⅱ動詞1 (依據; 依照)...
  • : 數副詞(屢次) frequently; repeatedly
  • 標準 : (衡量事物的準則; 榜樣; 規范) standard; criterion; benchmark; pip; rule; ètalon (衡器); merits
  1. Aiming at the self - estimation of threat to the sam system, and basing on the analysis of support distance of the target acquisition radar and operation efficiency of the system in three intercept sections, a distance - threat index and a type - threat index of the target are proposed, and a threat - estimation decision - making model is established, and a standard of fire - striking order in each section is put forward

    摘要針對地空導彈系統的威脅自動判斷問題,基於對目指示雷達保障距離以及三種攔截區間中系統作戰效能的分析,提出了目距離威脅指和目類型威脅指的概念,進而建立了一種連續型的威脅判斷決策模型,並給出了每個區間火力打的排序
  2. The signature hole is the 8th 162 yards, par 3 where you play across gosford bay after which the hole is named to a far from generous green, close to a barrier of sleepers that provide protection from the tide

    第8洞為簽名洞162碼,3 。球越過高斯福德海灣,到達一個非常狹小的果嶺,緊臨一道枕木屏障用來防護潮汐的侵入。
  3. The main research work and achievements in the dissertation are given as follows : 1 using dynamic programming techniques and two different criterions ( maximum probability of hit criterion and maximum expected no. of penetrators criterion ), the author investigates optimal allocation of tactical missiles between a primary target and a secondary target under the condition that the primary target is defended by the secondary target ( only " normal " defensive mode can be used by the defender ), presents the optimal policy of tactical missiles attacking the primary target

    本文所進行的研究工作和取得的創新性成果主要為: 1利用動態規劃理論和兩個不同的則(最大命中概率則和最大期望突防則) ,研究了一個主要目在一個次要目防衛下(次要目採用「常規」防守模式) ,戰術導彈對這兩個目的優化分配問題,給出了導彈對目的最優分配策略。
  4. 2 based on dynamic programming techniques, using three different criterions ( maximum probability of hit criterion, maximum expected no. of penetrators criterion, and minimum expected cost criterion ), the author investigates optimal allocation of tactical missiles between a ( several ) primary target ( s ) and several secondary targets under the condition that the primary target ( s ) is defended by the secondary targets ( only " normal " defensive mode can be used by the defender ). the optimal allocation policies of tactical missiles between the primary target ( s ) and the secondary targets are given

    2基於動態規劃理論,採用三個不同的則(最大命中概率則、最大期望突防則以及最小期望費用則) ,研究了一個和多個主要目在多個次要目防衛下(次要目採用「常規」防守模式) ,戰術導彈對這兩類目的優化分配問題,給出了導彈對目的最優分配策略。
  5. An investigation of the rijndael algorithm which is the advanced encryption standard of usa is taken in this thesis. we have focused on developing the cryptographic properties of the rijndael sbox from the viewpoint of boolean function, walsh spectrum and algebraic structures, on the attacks against the reduced variants of rijndael, and on the optimized implementations of rijndael. the key contributions follow below

    本文對美國高級加密rijndael演算法進行了比較深入的研究,內容包括:從布爾函、 walsh譜和代結構的角度對其s盒密碼性質進行的研究,簡化演算法的攻方法以及演算法的優化實現問題,主要成果有: 1 、提出求解布爾函表達式的兩種新方法,具有簡潔、易於編程實現、確而快速的特點,應用於des演算法獲得與公開文獻相符的結果,應用於rijndael演算法首次求出其s盒布爾函表達式。
  6. In this paper, a series of surveys on road condition, pavement - performance and destroy reason are analyzed, soil property, hydrologic regime are combined, modulus of resilience are confirmed on heavy compaction test, foundation classification in area of qinhuangdao is divided into 3 grades and highway is divided into 3 districts according to the principle that different soil grades produce the same effect on thickness of base course or bottom course, classification of traffic is divided into 4 grades after observation materials of traffic volumes are collected extensively, traffic characters and parameters are analyzed

    本課題在對現有路面結構狀況和使用狀況進行調查,並對路面使用性能和破壞原因進行分析的基礎上,結合秦皇島地區的土質、水文條件,確定重型條件下土基回彈模量值,依據不同等級土基對路面基層或底基層的厚度產生大致相同效應的原則,將秦皇島地區地基強度等級劃分為三級並將本地區公路分成三個區。在廣泛收集交通量及組成的觀測資料,了解交通特性,進行交通參分析后將交通量等級劃分為四級。
  7. Abstract : artifical intelligence methods are implemented to simulate thebehaviors of axially and laterally loaded piles using the field observation tests data obtain ed f rom the drilled shafts and driven piles. the optimal neural network model is deve loped using only simple input data of spt - n values and piles ' geometrical featu r es etc. the analysis for r. c piles of some projects is performed adopting the bp n n and grnn models respectively, and the obtained predicated results are compared w ith the data from conventional design method. it demonstrated the obvious advanta ges of neural networks in the design of pile foundations over the traditional me thods. this paper has an important practical significance and a referential worth iness in the design of pile foundations

    文摘:根據鉆孔樁和打樁的原型試驗觀測的據,運用人工智慧方法對橫向承載樁和軸向承載樁的工作特性進行模擬,並利用貫入試驗( spt - n )值和樁的幾何特性等簡單的輸入據,開發出相應的優化神經網路模型;然後,運用反向傳播神經網路模型和廣義回歸神經網路模型分別對某工程的鋼筋混凝土樁進行分析,並將求得的預測結果與常規設計法的結果進行比較,結果表明神經網路方法比傳統方法有明顯的優越性,在實際工程設計中具有重要的參考價值和現實意義。
  8. The data from several standard shock initiation and he performance experiments at home and abroad were used to determine the parameters required for the ignition and growth model of the acceptor explosive. the two test explosives of hmx / f2641 ( 90 % tmd and 95. 5 % tmd ) and the three test explosives of rdx / f2641 ( 80 % tmd 、 90 % tmd and 95 % tmd ) are numerically simulated

    從國內外高能炸藥沖起爆實驗中得到的據來確定受主炸藥的點火增長反應模型的參,對hmx / f2641的90 % tmd和95 . 5 % tmd的兩種受試炸藥, rdx / f2641的80 % tmd 、 90 % tmd 、 95 % tmd的三種受試炸藥進行了值模擬。
  9. Above and below the keyboard key or w, s, a, d keys to control movement ; mobile mouse aiming point and click shooting ; numeric keys or mouse scroll switch weapons, but also can directly point game figures button ; no. 1 weapon state under the space bar to the release of landmines, which can be recycled

    鍵盤上下左右鍵或w s a d鍵控制移動移動鼠,點左鍵射字鍵或鼠滾輪切換武器,也可以直接點游戲中字按鈕在1號武器狀態下按空格鍵釋放地雷,地雷可以回收。
  10. The general attenuation law of ground vibration caused by heavy tamping is verified by spectrum analysis in this paper. moreover, the relationship between attenuation index and standard penetration number is created through combination analysis of vibration attenuation and surface wave propagation

    在此基礎上,通過面波分析,得出了場地介質衰減指和表徵場地介質性質的參?貫入之間的關系,給出了表達式的一般形式。
  11. In this paper, first discussed are the corresponding results in highway and dam constructions and the engineering characters of rock - fills are deeply analyzed, especially the relationships between gradation, strength and maximum dry density, long - term stability of fillers including earth - fillers and rock - fillers and some conclusions of use are drawn. by in - situ tests and researches on compacting mechanism of high - filled rock embankments, effecting factors on compaction, construction technology and shock compacting technology, obtained in this paper are the compacting technology of high - filled rock embankment and the optimal parameters of rolling compaction. by deeply research on the theory and methods of quality control of high - filled embankment, settled are the questions as quality detection method and control standard of high - filled rock embankment

    本文首先總結和分析了國內外公路和壩工行業已有的相關成果,深入探討了填石料的工程性質與最大幹密度、長期穩定性等之間的關系,得到了一些有益的結論;通過現場試驗路堤的試驗和對高填石路堤壓實機理、填石路堤壓實效果影響因素、施工工藝和沖壓實技術等研究,解決高填石路堤壓實工藝和最優碾壓參控制等技術問題;通過深入研究填石路堤壓實質量控制原理和方法,解決高填石路堤壓實質量檢測方法和控制技術難題;解決高填石路堤沉降觀測技術問題,並根據沉降觀測結果研究高填石路堤地基和路堤沉降變化規律,得到了能預測沉降變化規律的「龔帕斯」成長曲線預測模型;根據工程實際,深入研究了邊坡穩定性的影響因素,得到了有益的結論。
  12. A golf score of two strokes under par on a hole

    低於桿兩桿比每穴規定球次兩棒的高爾夫成績
  13. The ratios of charpy impact value of small size specimen to that of the standard are studied by using the series charpy v - notch impact test method and the question how to select equivalent ratio of the charpy impact quota of non standard sample is also discussed

    通過夏比v型缺口沖試驗,研究了結構鋼小尺寸試樣的沖功與試樣沖功的比值在系列溫度沖試驗中的變化規律,並述評了用等效比值確定小尺寸試樣沖功指的問題。
  14. In the thesis domestic and foreign relation model of standard penetration blow count and shearing velocity, standard penetration blow count and deformation modular, shearing velocity and foundation bearing capacity are analyzed. on base of these analysis a new calculation model that applying rayleigh wave velocity to calculate the stress ratio of pile and soil between piles is established. because of the difference of region and soil character, the new model own three branch model, ie, japan model, wuhan model, xia liaohe mo del, in three different conditions

    文章通過分析國內外貫入與剪切波速、貫入與變形模量、剪切波速與地基土承載力之間的關系模型,並考慮到地區性和土質類別的差異,分別選用日本公路橋梁抗震設計新規程模型(日本模型) 、武漢地區模型、下遼河平原模型三種模型建立了新的樁土應力比計算模型? ?應用瑞雷波速求解樁土應力比之間的計算模型。
  15. ( 1 ) the got by experiment may contain thermal contributing by electrons and this part is not can be ignored. ( 2 ) got by thermal dynamic experimental data under normal temperature and pressure can be a standard for various theoretical models, but its precision should be analysis carefully before to use. ( 3 ) the method of using the migault ' s formular associate tuning up parameter to express which often be used is not very reasonable

    本文第3章就gr neisen物態方程研究了三方面問題:第一方面,在分析了幾種不同定義的gr neisen系的區別與聯系的基礎上指出, ( 1 )在沖壓縮區,直接依據實驗據獲得的往往包含不可忽略的電子熱貢獻; ( 2 )常態熱力學可作為檢驗gr neisen系理論模型的一個,但應注意該實驗測量值的精度(包括由於實際材料中存在的「非三項式物態方程因素」的影響) ,而所總結的在周期表上所具有較明顯的規律性,可作為對該值精確程度判斷的參考; ( 3 )指出一種以調節參的migault公式描述的常用方法的基礎與實際情況並不相符。
  16. Fortunately, ipsec provides us security services for ip layer and higher layers, such as access control, connectionless integrity, data origin authentication, rejection of replayed packets ( a form of partial sequence integrity ), confidentiality ( encryption ), limited traffic flow confidentiality, and so on. the thesis gives a type of network security architecture based on ipsec system, it includes the following contents : 1 analyzing the security problem in tcp / ip protocol stack, current main network attack methods and regular defense methods. 2 studing the overall architecture, main security protocols, application environments, and working mechanism of ipsec

    本文所提出的新一代網路安全體制就是建立在ipsec體系基礎上的,在本文的撰寫過程中,我主要進行了如下一些工作: 1深入分析了由tcp ip協議棧本身帶來的安全問題、當前主要的網路攻方法以及常採用的防範對策; 2研究了ipsec的總體結構、主要安全協議、應用場合以及其工作機制; 3研究了當前常用的各種據加解密機制以及密碼演算法,深入分析了它們各自的特性和具體的使用方式; 4閱讀了大量關于混沌密碼的文獻資料,了解目前混沌密碼的研究動態和成果,研究混沌密碼體制的工作機理,然後利用vc + + 6 . 0作為開發平臺對一類混沌密碼體制進行了實現,並為它編寫測試代碼評估其性能。
  17. Many are standard key combinations used in most windows applications ; the table lists the specific function that the keystroke has in the ide

    其中許多組合鍵是大多windows應用程序中使用的組合鍵;該表列出了ide中鍵的具體功能。
  18. Abstract : through contrasting of the results of different geotecnical investigation methods in several engineering project the effective methods to determine ground standard value of bearing capacity by standard penetration is presented

    文摘:通過對實際工程不同勘探方法對比研究,提出了用貫試驗錘確定粘性土地基承載力值的有效方法。
  19. 3. the only non - linear part of the algorithm ? s - box is researched in the view of multi - output boolean function, and the algebraic expression and boolean function expression of the s - box are obtained. after analyzing a series of the cipher properties of the s - box, the inner course that camellia could be chosen as european block cipher standard and could withstand many attack ways effectively is revealed

    3 .從多輸出布爾函這一角度對此演算法中唯一的非線性部件? s盒進行了研究,得出了s盒的代表達式和布爾函表達式,並通過對s盒的一系列密碼性質的分析,揭示了camellia演算法被選為歐洲普通型分組密碼並能抵抗多種攻方法的內在原因。
  20. Based on the in - depth study of technologies of stb serial port updating and defending illegal attack, client software serial port updating and real - time defending solutions are proposed to for satellite stb, according to national standard. it has also referred to the development experience of similar products in the world. besides, both the hardware and software features of satellite stb are considered

    本文在深入研究機頂盒軟體串口升級技術以及防非法攻技術的基礎上,根據國家制定的相關,借鑒國內外相關產品的開發經驗,結合衛星字機頂盒的硬,軟體環境特徵,提出了在衛星字機頂盒環境中分別實現客戶端軟體串口升級以及實時防非系統的方案。
分享友人