檢測實例檢查 的英文怎麼說

中文拼音 [jiǎnshíjiǎnzhā]
檢測實例檢查 英文
test case inspection
  • : Ⅰ動詞1 (查) check up; inspect; examine 2 (約束; 檢點) restrain oneself; be careful in one s c...
  • : 動詞1. (測量) survey; fathom; measure 2. (測度; 推測) conjecture; infer
  • : Ⅰ形容詞1 (內部完全填滿 沒有空隙) solid 2 (真實; 實在) true; real; honest Ⅱ名詞1 (實際; 事實...
  • : 查名詞1. [植物學] (山查) hawthorn; haw2. (姓氏) a surname
  • 檢測 : check; detection; test; gauging; detecting; sensing; [工業] checkout; measuring
  • 檢查 : 1 (用心查看) check up; inspect; examine; censor; survey rummage; review; jerque; docimasia 2 (...
  1. In collaboration with the department of physicis and material science of the city university of hong kong and the electronic and engineering department of the chinese university, the faculty of medicine has conducted research on different aspects of computer - aided navigation such as brain shift prediction with finite element model, three - dimensional ultrasound based correction for brain shift, accuracy verification, robotic system, surface identification and matching

    通過與香港城市大學物理及材料科學系及香港中文大學電子工程學系的協作,我們正發展電腦輔助的神經導航技術的多方面研究,如,採用有限元模型預腦偏移;除去腦偏移的誤差的立體超聲技術;手術準確性的證;腦表面區域的定位。
  2. These file systems rely on restart - time utilities that is, fsck, which examine all of the file system s meta - data such as directories and disk addressing structures to detect and repair structural integrity problems

    這些文件系統依靠重啟用程序(也就是fsck ) , fsck文件系統的所有元數據(如:目錄和磁盤尋址結構)以和修復結構完整性問題。
  3. Therefore, a new method - pile defect inspection using low strain pile gauge - is suggested in this paper, and a set of curve analysis method which have sound effect is obtained through a great deal of practices

    本文提出了使用低應變樁儀樁身缺陷的新方法,並通過大量總結出了一套曲線分析方法,通過踐取得了較好的效果。
  4. The main results in this paper as follows : first, a prototype of a shape - based image database retrieval system is completed, it can receive the query mode both by giving an example image and by sketching the desired object on the screen, second, five shape - based image retrieval methods are realized ; third, an algorithm based on triangulation for shape - based image retrieval is brought forward. in this algorithm, firstly, the edge of the original image is followed and the candidate corners in the original image are detected. then the counterpoints of the candidate corners in the result of edge follow are found, and the boundary corners whose counterpoints have been found are queued in the order of their counterpoints in edge follow

    同時本文中主要完成了以下三方面的工作:完成了一個基於形狀特徵的圖象索的原型系統,可子圖象或徒手繪草圖兩種詢方式;現了五種利用形狀特徵進行圖象索的具體方法,並對其進行了分析比較;並且在繼承將三角剖分引入形狀索的思想基礎上提出了利用三角剖分進行形狀索的一種新演算法:先對原圖象進行邊界跟蹤和角點;然後尋找初始角點在邊界跟蹤中的對應點,並對找到對應點的角點按其對應點在邊界跟蹤中的順序進行排序;再對排序后的角點進行德洛內三角剖分,得到能表示目標真形狀的三角形序列;最後計算三角形序列的角度直方圖作為形狀特徵,並進行相似性匹配。
  5. The ids works by two way, misuse detection and anomaly detection, misuse detection flags an intrusion on intrusion signature, this kind of detecting technic can be realized much more easily, and much more accurate, but it can not find some intrusiones that have been disguised or new kinds of intrusion. the anomaly detection can detect in more wide field, anomaly detection can compare new statistic data with average record, then anomaly record will be found, but it ' s more difficult to set a threshold, if the threshold is too big, some intrusion may be put through, if the threshold is too small, the ids will give more false positive alarm, and the threshold will be different with different people or different period, so the ids just simply show us their suspicious record, the administrator or expert will be in duty to analyze this record and give conclusion, the ids give more alarm than it should, leave us more detection record to analyze, and this is a hard work, we can not distinguish an intrusion or not if we analyze only one record, but we can judge if we find the relation among mass detection evidence. in this article, we try distinguish an intrusion using d - s theory ( proof theory ) instead using manual work, the ids will be more helpful and efficient

    濫用採用的是特徵的方法,現較為簡單,判斷的準確性較高,但是不能判斷一些經過偽裝的入侵或特徵庫中尚未包含的入侵,異常能夠根據以往記錄的特徵平均值,判斷出異常情況,但是對于異常到什麼程度才視為入侵,這個閥值非常難以確定,閥值設定的太高,有可能漏過真正的入侵,如果設定的閥值太低,又會產生較高的誤警率,而且這個閥值因人而異,因時而異,因此現在的入侵系統把這部分異常記錄以一定的形式顯示出來或通知管理人員,交給管理人員去判斷,而這些ids系統難以判斷的記錄,如果對每個證據單獨地進行觀察,可能是難以判斷是否是入侵,而把許多先後證據關聯起來,專家或管理人員根據經驗能夠判斷訪問的合法性,本文試圖引入人工智慧中證據理論的推理策略和示學習方法,代替人工分析,可以提高效率,降低誤警率,並可以對一個正在進行得可疑訪問,通過搜索及時判斷,及時阻斷非法訪問,比事後得人工處理更有意義。
  6. Through the instance of inspection of roadbed disease of certain highway engineering and field operating practice, application prospect and extension value of this technology in the domain of roadbed quality inspection are discussed

    通過瑞雷面波法在某高速公路路基病害調中的工作及現場工作方法,論述了該技術在公路路基質量中的應用前景及推廣價值。
  7. Based on the investingation and some study methods of the stability on the goaf, the paper has the goaf of the first and second tunnels of wu long channel on coal mine railway leased line in da ning of shanxi province as an example, according to the engineering geological invesitigation and maping in the earth ' s surface, also combining the visit on the relate people, firstly has a geological judge on the space extend of the mostly ledges which have been picked ; then adopts the instrument of engineering surveying and checking ( for short sws ) which is relatively advanced inside and outside to test by surface wave the rockmass and solid near the middle line of the tunnel ( total forty meter ), and has a relatively exact judgment on the place that the goaf impossible reveal ; lastly passing the validate by drilling, it make clear that the results which tested by sws is reasonable and believable, based on finding out clearly the space extend of the goaf, the author makes a relatively systemic study on the stability of wall rock around the goaf

    因此,明采空區的具體位置,在此基礎上對場地進行工程適宜性評價,對整個工程建設具有重要的指導意義。本論文在總結前人對地下采空區勘察及有關穩定性研究方法的基礎上,以山西大寧煤礦鐵路專用線五龍溝1 ~ # 、 2 ~ #隧道采空區為研究,在詳細的地表工程地質調繪的基礎上,結合通過對采空區有關人員的探訪,首先對主要開采礦層的空間展布進行地質判斷;然後採用國內外較為先進的工程勘探與儀(簡稱「面波儀」 ) ,對1 ~ # 、 2 ~ #隧道中線兩側一定范圍內(共40米)進行了面波試,對采空區的可能出露部位進行了較為準確的判斷;最後通過鉆探加以驗證,表明面波儀的試結果是較為合理可信的。
  8. And then describe distributed transaction process and distributed query, etc. besides, deadlock detection algorithms in distributed database is deeply analyzed

    描述分散式事務處理、分佈詢等。此外本文還詳細介紹了分散式死鎖演算法和假死鎖以及解決方法。
  9. At first, the article describes the basic concept of testbench ; summaries general function verification approaches : white - box verification, black - box verification, and grey - box verification, and shows their different application situations ; examples general verification tools : linting tools, code review, simulator, waveform viewer and code coverage. after doing that, it discusses how to analysis the granularity for verification and how to specify the verification, and details the construct relations between verification specification, testcase and testbench

    本文首先闡述了試平臺的基本概念;歸納了常用的功能試方法:白箱試、黑箱試和灰箱試,並說明了其不同的應用場合;列舉了常用的試工具:代碼靜態分析工具、代碼、模擬器、示波器和代碼覆蓋;接著討論了如何在試計劃中分析試粒度、確定待特徵;闡明了待特徵、試平臺之間的結構關系。
  10. Second, discussing the detecting and eliminating of inference channel, different channel detecting methord are provided according to static, dynamic and compositional channel, and a new algorithm of eliminating the inference channel by promoting security was presented. third, discussing many problems encountered by transaction, which is from single - level to multilevel, and a transaction schedule algorithm is given based on data replicated architecture. according to the theory mentioned above, a mls / dbms is developed, and the experiment result has showed the correctness of the theory

    本文圍繞安全數據模型,多級安全環境下的事務處理,推理控制展開了探討,首先針對空值的二義性和數據穿越問題,提出一種改進的多安全模型,並對外鍵引起的存儲隱通道進行了控制,提高了詢的效率;其次探討推理通道的和排除問題,針對靜態、動態推理通道和復合通道分別給出了不同的通道方法,並提出一種通過提高輸入安全密級來消除推理通道的演算法;最後討論了事務從單級拓展到多級所面臨的各種難題,提出了一種基於數據復制結構的事務調度演算法。
  11. Second, in a realistic program, you should generally test the return values of all the api calls in this program immediately to detect errors ( e. g., import failure )

    第二,在一個際的程序中,你一般應該立即程序中所有api調用的返回值,以錯誤(如導入失敗) 。
  12. This paper deploys research about the damnification identify, employ capacity and reinforce technology with reason of double bend arch bridge through finding out disease position of construct and cause, colligating these result of the actual bridge detection and load test and analysis and research on the theoretics of damnification, and so on, despending on a lots of measure and means, finding out its present condition and checking structure internal force through choosing the proper mechanics model according as a lots of prototype information

    本題以安徽省省道s310上k139 + 000處的大店崗橋為,從入手,利用各種方法和手段,了解雙曲拱橋的現行工況,並依據各類原型資料選擇合適的力學模型進行結構內力驗算,通過荷載試驗、理論分析等方法,明結構的病害部位和形成原因,綜合結果和荷載試驗結果以及損傷理論的分析研究等等,展開對雙曲拱類橋型的損傷鑒定、使用能力和合理加固技術方法的研究。
  13. Meanwhile some ways are put forward to effectively settle some issues existing in the recent professional medical insurance system, such as unforeseen medical issues, medical errors, medical defect and medical disputes, with the aid of establishing the individual risk - taking fund based on insurance for medical responsibility methods the staff of taizhou hospital, zhejiang was chosen as the research sample. by way of consulting reference books, interviewing and issuing questionnaries, the main risk factors influencing medical professions are discussed. the proportion and extent affected by the risk factors also are analyzed

    研究方法以浙江省臺州醫院及其職工作為研究的樣本,通過文獻、訪談及問卷調等方法,研究醫療職業的主要風險因素,分析各因素的影響程度及比關系,確定各類科室、各層次醫務人員職業風險分值,進而由學科專業、技術難度、浙江大學碩士學位論文職稱職務等要素綜合定個人保險基金,並將有關數據錄入excel數據庫,用證結果驗方案的科學性。
  14. Project management is a discipline which has come from practices and must be improved gradually in practices. in this paper, taking world bank financed water conservancy project ( wcp ) as example, the author tries to analyze this project ' s running mode from the beginning, planning, implementing, controlling to final acceptance, assess the methods in the human resources management, purchase management, monitoring and evaluation management, planning management, supervising and controlling, and project running management, and at last comes up with some suggestions for present project management in china

    項目管理是一門來自於踐並在踐中不斷發展的學科,本文將以「利用世行貸款發展節水灌溉項目」為,分析項目管理理論在踐中的應用,對該項目的運作方式,包括從啟動、計劃、施、控制、總結到驗收的全過程,以及項目在人力資源管理、監與評價、采購管理、計劃管理、與監督和項目運行管理等方面的作法進行分析,並結合我國的國情和項目管理發展現狀得出啟示和提出建議。
  15. The paper briefly reviews the use of rebate rules in validity tests of the contingent valuation method, a survey method widely used to estimate the value of natural resources under realistic, but hypothetical, conditions

    本報告簡要回顧退還規則之應用在條評估法的效度,這是在真但假設條件下,廣泛用來評估自然資源價值的一種調方法。
  16. Based on analyzing the main characters and the limited aspects of many software testing management tools in existence, regarding the requirement of many domestic software companies, the author researched and developed a software testing management tool, which includes such characters as listing under : ( 1 ) testing running process management, separating the static information and dynamic information of the testing cases to manage the running process of the testing cases, supporting iterative testing and regressive testing ; ( 2 ) providing the individual setting of the classified properties of bug and testing case, which user can define in according to their requirements, and then providing corresponding querying and statistic functions ; ( 3 ) testing progress plan management, setting testing milestone and management check point to manage the testing progress plan ; ( 4 ) testing task management, using tier structure to express task ' s relationship, supporting task cooperative management based on work flow, monitoring the task ' s time, cost and performance during the whole process ; ( 5 ) testing evaluation, using testing cover rate and bug reports to evaluate a test

    本文分析了現有的軟體試管理工具的主要特點和局限性,結合國內從事軟體開發的組織的際需求,提出了一個具有下列技術特色的軟體試管理工具: ( 1 )試運行管理,通過將試用的靜態信息和動態信息分離來進行試用運行的管理,為重復試、回歸試管理提供支持; ( 2 )軟體缺陷和試用的分類屬性值的定製功能,使用戶可以根據自身組織的管理要求進行自定義,根據定製提供相應的分類詢、統計等處理功能; ( 3 )試進度計劃管理,通過設定試里程碑和管理點來對試進度計劃進行管理; ( 4 )試任務管理,使用層次結構表達任務的結構關系,提供基於工作流的任務協同管理,全過程監任務的時間、成本和績效; ( 5 )試評價,通過試覆蓋和缺陷報告等方法來進行試評價。
  17. Can detect some instances of improper resource release, such as opening a stream in a method and not closing it

    )這樣的代碼審工具可以出不適當的資源釋放的一些,比如在一個方法中打開一個流卻不關閉它。
  18. Based on the summary of previous evaluation methods, this paper points out the shortcomings of them, then draw the theory of artificial neural network into risk evaluation, through an example of some kind of investment project and the training and examination of a group investigation sample, it sets up the artificial neural network model. at last, this model is applied to the real case of an engineering project to evaluate its risk level and satisfactory result is made ; in the fifth chapter of this paper, the main risk factors that affect the economic appraisal of the engineering investment project are described through the form of relationship chart. then it is proved by way of deduction of formula that the risky influence that is brought by inflation must be considered in the engineering investment project

    本文在對以往評價方法進行歸納總結的基礎上,指出其中存在的不足之處,將人工神經網路理論引入到風險評價中,以某一類投資項目為,通過對一組調樣本的訓練和,建立了工程投資項目風險評價的人工神經網路模型,並通過對模型進行了驗證,取得了滿意結果;在本文第五部分,對影響工程投資項目經濟評價的主要風險因素以關系圖的形式進行了描述,然後通過公式推導證明了在工程投資項目中應該考慮通貨膨脹帶來的風險影響,接著在分析以往建立的經濟評價凈現金流量表達式存在不足的基礎上提出了另外一種方式的表達式,即凈現值解析模型,對該模型的求解進行了詳細的說明,並分析了如何恰當的選擇各風險變量的概率分佈,最後在考慮投資者風險偏好的前提下,提出了工程投資項目新的風險度量模型。
分享友人