檢查模型 的英文怎麼說

中文拼音 [jiǎnzhāxíng]
檢查模型 英文
detection model
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 查名詞1. [植物學] (山查) hawthorn; haw2. (姓氏) a surname
  • : 模名詞1. (模子) mould; pattern; matrix 2. (姓氏) a surname
  • 檢查 : 1 (用心查看) check up; inspect; examine; censor; survey rummage; review; jerque; docimasia 2 (...
  • 模型 : 1 (仿製實物) model; pattern 2 (制砂型的工具) mould; pattern3 (模子) model set; mould patter...
  1. By itself, on demand business is an apolitical model : it looks at what s needed to ensure that all resources are used to the best benefit of the enterprise

    就其本身而言,隨需應變業務是一種與策略無關的:它只是自己需要哪些資源,從而確保能夠最有效地使用企業的所有資源。
  2. This paper mainly aims at the characteristics of the hardware and software structure of the parallel computer on satellite, and has fulfilled researches of fault tolerant technique in three aspects of control theories and engineering : the first research of the system level fault - tolerant module is based on the system structure of the parallel computer on satellite, a kind of cold backup module and a kind of hot backup module for multiprocessor computer have been put forward. then the research of software fault tolerant technique which is based on the operate system named rtems has been carried, the mission level fault - tolerate arithmetic and the system level fault - tolerate mechanism and strategies based on the check point technique have been put forward, at the same time the self - repair technique of software which has used the technique of system re - inject has been studied. finally the technique of components level fault - tolerant based on fpga has been studied, a kind of two level fault - tolerant project which aims at the fault - tolerant module of the parallel computer on satellite has been put forward, and the augmentative of circuit that project design realization need is little, this project can avoid any breakdown of any part logic circuit of the fpga

    本課題主要針對星載并行計算機體系結構及軟體結構的特點,從如下三個方面進行了容錯控制理論研究和實踐工作:首先進行了基於星載多cpu并行計算機體系結構的系統級容錯研究,提出了一種多cpu冷備份容錯和一種多cpu熱備份容錯;然後進行了基於rtems操作系統的軟體容錯技術研究,提出了任務級容錯調度演算法以及基於點技術的系統級容錯恢復機制和策略,同時研究了利用系統重注入進行軟體在線自修復的容錯技術;最後研究了基於fpga的部件級容錯技術,提出了對容錯塊這一星載并行計算機關鍵部件的兩級容錯方案,實現該方案所需增加的電路少,可避免板級晶元以及fpga晶元內部任何邏輯發生單點故障。
  3. Enterprises must compare with the best satisfaction value after receiving the index satisfaction at all levels, find out one ' s own advantage and disparity from it, implement and improve, about improve model question that input and output maximized in fact, enterprises are in a situation that the capital cost is certain, the rational input to each index of distribution, make customer satisfaction get the greatest improvement customer satisfaction test and assessment is a dynamic course, enterprises must also implement a lot of investigations, measure satisfaction value many times, in order to check the impro ved result, cany on essential adjustment, make the improvement scheme correspond to reality

    企業在得到各級指標滿意度之後,必須與最佳滿意度值比較,從中找出自己的優勢和差距,實施改進,關于改進實際上是投入產出最大化的問題,企業在投資額一定的情況下,合理的分配對各個指標的投入,使得顧客滿意度得到最大的提高。顧客滿意度測評是一個動態的過程,企業還必須實行多次調,多次測量滿意度值,以改進的效果,進行必要的調整,使得改進方案符合實際。
  4. Developing the lithography process models to properly characterize critical dimension ( cd ) variations caused by proximity effects and distortions introduced by patterning tool, reticule, resist exposure, development and etching, they are beneficial to develop a yield - driven layout design tool, the engineers could use it to automate the tasks of advanced mask design, verification and inspection in deep sub - micron semiconductor manufacturing

    建立準確描述由於掩製造工藝、光刻膠曝光、顯影、蝕刻所引起的光學鄰近效應和畸變所導致的關鍵尺寸變化的光刻工藝,有助於開發由成品率驅動的版圖設計工具,自動地實現深亞微米下半導體製造中先進的掩設計、驗證和等任務。
  5. This framework is composed of semantic modeling of certain domain, semantic description of resources, extension search of semantic model, and etc. this paper emphasize on rdf inference mechanism, which is the fundamental of sematic retrieval

    該框架主要由特定領域的語義建、信息資源的語義描述、語義擴展詢等部分組成。 rdf的推理機制是本文研究的重點,也是進行語義索的理論基礎。
  6. First of all, the assembly model of dfa is established and the data structure of the model is proposed ; in order to redesign product and structures and select optimized assembly plans, an assemblability evaluation system is constructed. secondly, assembly process planning is analyzed, including assembly path planning and assembly sequence planning ; and then the thesis brings forward the way of 11 - tuple to represent the movement of assembly / disassembly of assembly elements. in the end, this paper makes an research on the technology of interference checking, raised a kind of algorithm of swift interference checking based on envelops bounding box decomposition, hence, the accuracy and efficiency of the algorithm is improved dramatically

    首先建立了面向裝配設計的裝配,給出了它的數據結構;接著從面向產品結構和裝配工藝過程兩方面再設計的角度,構建了裝配性評價體系;接著闡述裝配工藝規劃技術,包括裝配路徑規劃和裝配順序規劃;然後提出了11元組法來表示裝配元件的裝拆運動;最後對干涉驗技術進行了研究,採用一種基於包容盒逐層的快速干涉演算法,提高演算法的精度和效率。
  7. Because these assertions check for changes in the model, not the view

    因為這些斷言只是在中,而不是在視圖中發生的更改。
  8. In collaboration with the department of physicis and material science of the city university of hong kong and the electronic and engineering department of the chinese university, the faculty of medicine has conducted research on different aspects of computer - aided navigation such as brain shift prediction with finite element model, three - dimensional ultrasound based correction for brain shift, accuracy verification, robotic system, surface identification and matching

    通過與香港城市大學物理及材料科學系及香港中文大學電子工程學系的協作,我們正發展電腦輔助的神經導航技術的多方面研究,例如,採用有限元預測腦偏移;除去腦偏移的誤差的立體超聲技術;手術準確性的證實;腦表面區域的定位。
  9. Founding - liquid penetrant inspection - sand, gravity die and low pressure die castings

    鑄件.液體滲透.砂鑄件,金屬鑄件和低壓壓鑄件
  10. Basing on the thorough research and analysis of several essential technologies, we have implemented identity authentication, illegal link, network security aduit and anti - virus detection etc. we used digital certificate to accomplish identity authentication which was based on the study and analyzing of all kinds of authentication. in regard to network security audit, we mainly researched on the distributed model of network security audit and the audit strategy of the rule library. in view of the traditional rule library ’ s flaws, with the formalizing description of audit rule, we proposed a dynamic security audit strategy model which was based on the nature deduction system

    在研究並分析各種認證技術的基礎上,採用基於數字證書的認證方式,實現用戶上網資格審;針對網路安全審計,重點研究了網路安全審計分散式以及基於規則庫的審計策略,並針對傳統審計規則庫的缺陷,通過對審計規則進行形式化描述,提出了一種基於自然演繹系統架構的動態安全審計策略dsasm ( dynamicsecurityauditstrategymodel ) ,並詳細論述了該的定義和推演演算法;通過深入研究非法外聯的關鍵技術和,提出了基於路由表找的c / s架構的非法外聯;針對病毒測,提出了基於主機的防病毒測思想,在客戶端進行病毒防護。
  11. We are not modeling just from a viewport, don ' t forget to check the model from all viewports

    我們並不是僅僅從一個視窗里建,別忘了從其他視圖檢查模型。 )
  12. Check your mesh, don ' t forget to fix all gaps or holes in the mesh

    檢查模型網格,不要忘記修正所有的空隙與洞。
  13. Open the model with the default editor see figure 3 and open the properties view, then examine the properties of each node in the model tree

    用默認的編輯器打開這個(參見圖3 ) ,再打開properties視圖,然後檢查模型樹中每一個節點的屬性。
  14. The paper puts forward a kind of economical numerical control milling machine system which is supported by windows and industry pc that are acted as software and hardware platform on the base of analyzing the present development of economical numerical control system and some existent problem, and expatiates the system software ' s collectivity frame, also introduces detailedly form and operational way of the user ' s interface. besides, the thesis also frames and accomplishes each module such as syntax inspect module, translation module, tool compensation module and track interpolation module adopting visual c + + 6. 0 and the kind of facing object and modularized program design method by analyzing rationales and function of the software ' s modules, moreover presents the programmer ' s flow chart and parts of source code, whereafter validates arithmetic of translation and tool compensation by simulating process testing program

    本文在分析了我國經濟數控系統的發展現狀以及目前存在的一些問題的基礎上,提出了一種以windows和工業pc機作為軟、硬體平臺的經濟數控銑床系統,闡述了該系統軟體的總體結構,並對其用戶界面的組成及其操作過程做了較為詳細的介紹,分析了軟體的各個塊的基本原理和功能,採用visualc + + 6 . 0以及面向對象、塊化的程序設計方法,完成了語法塊、譯碼塊、刀具補償塊以及軌跡插補塊的具體設計,並給出了程序設計流程圖和部分源代碼,通過系統的擬程序擬加工過程驗證了譯碼和刀補演算法的正確性。
  15. The approach includes : obtain cutter location points from cutter contact points ; interference pretreatment by convex box of data cloud and reducing check area ; interference detection and tool - position correction based on data cloud

    通過計算點雲的曲率,確定切削步長和行距,採用基於點雲的干涉檢查模型,推導出干涉處理的解析式,得到了無干涉加工刀軌。
  16. The delay - time - based inspection models and their comparison

    基於時間延遲維修理論檢查模型的比較研究
  17. Ideally, the tests for a program will check both the model and the view

    在理想情況下,對程序的測試將同時檢查模型和視圖。
  18. Not only does the modified test check the view rather than the model, it also checks the content of selected rows, rather than just the number of rows

    修改後的測試不單檢查模型,還視圖,而且不只簡單地行的數量,還所選行的內容。
  19. Stations use hardpoints just like ships, so do not forget to place static hardpoints on large, flat surfaces in strategic locations, so that it is able to defend itself

    檢查模型的嚙合情況,確保不留縫隙。雖然小溝小洞在遠距離不容易發覺,但如果小載具飛近空間站站體,就很可能穿越縫隙飛到空間站站內部。
  20. In this paper, we introduce the basic theory of xml and the features of xml documents, and review several xml query languages and the application of the traditional information retrieval technology to xml data. we present further the general architecture of the retrieval system for xml documents, the index and retrieval algorithm and its implementation

    本文在對xml文檔的特點、 xml的基本理論、 xml詢語言以及傳統信息在xml文檔索中的應用等問題進行仔細分析的基礎上,提出了xml文檔索的總體系統框架、具體演算法及其實現。
分享友人