溢出技術 的英文怎麼說

中文拼音 [chūshù]
溢出技術 英文
overflow technique
  • : Ⅰ動詞(充滿而流出來) overflow; spill Ⅱ形容詞(過分) excessive
  • : 名詞(技能; 本領) skill; ability; trick; technique
  • : 術名詞1. (技藝; 技術; 學術) art; skill; technique 2. (方法; 策略) method; tactics 3. (姓氏) a surname
  • 溢出 : overflow; spill over; runoff; runout; transfluence; spilth; superfusion
  1. The spillage of technology

    外資效應的障礙與
  2. What are the ways to use fdi technology spillover

    Fdi途徑有哪些
  3. Generating mechanism of spillover effect of fdi technology

    效應的產生機制研究
  4. Effect of motivation of fdi on technology spillovers

    效應的影響
  5. On the spillovers between regions or manufacturing industries in china

    間的分析
  6. Studying on decomposition of technological innovation effects spillover

    創新成果的分解研究
  7. Therefore, a model of three sectors, respectively referring to domestic sector, manufacturing export sector and primary product export sector, has been established here to measure the technology spillover effects of export on domestic sector. finally, based on a broader framework, this dissertation went on to investigate the relationship between openness and china ' s economic growth, while the result shows that though there exists a notable dispute about how to measure the degree of china ' s openness, the index of trade dependence still maintains the better one to reflect china ' s economic openness. in the meanwhile, impulse response function ( irf ) method and forecasting errors variance decomposition ( fevd ) method, both of which are based on the vector auto - regression ( var ) system, are used here to investigate the dynamic relationship between openness and china ' s economic growth

    與傳統理論不同,新增長理論和新貿易理論都強調進步的作用,因此本文構建了一個三部門的效應模型(國內部門、工業製成品口部門以及初級產品口部門) ,考察了工業製成品口和初級產品口對國內非口部門不同的效應;第四,從更加廣闊的視野就貿易開放度與中國經濟增長問題進行研究,有關貿易開放度如何度量一直是存在較大爭議的問題,本文首先對該類研究文獻進行了較為詳盡的述評,然後運用生產函數方法對所選取的5個貿易開放度度量指標進行了檢驗,結果發現盡管一些已有研究認為外貿依存度無法真實度量一國經濟開放水平,但是本文研究結果表明外貿依存度仍是度量我國貿易開放度的較好指標,進一步採用基於var系統的脈沖響應函數法以及預測誤差方法分解法對貿易開放促進經濟增長的作用進行了動態刻畫。
  8. Each tenant shall fully and effectually indemnify atl against all claims and demands made against atl by any person in respect of any loss, damage or injury caused by or through or in any way owning to the overflow of liquids, or the escape of fumes, smoke, fire or any other substance or thing from the demised premises or to the neglect or default of such tenant ' s servants, agents or to the defective or damaged condition of the interior of the demised premises or any fixtures or fittings for the repair of which such tenant is responsible hereunder or against all costs and all expenses incurred by atl in respect of any such claims or demand

    對于由於已轉讓房地產的水、的煙、吸煙或火及其它任何物質,或由於這樣的承租人的僱工、代理人的疏忽或未履行的責任,或由於已轉讓房地產或者任何裝置的內部的缺陷以及損壞以任何方式造成的任何損失與傷害,每名租戶應完全並且有效地使高級試驗所不受任何人的任何索賠與要求的損害,承租人應在下面對此負責維修或承擔全部由高級試驗所所遭受的任何有關這種索賠與要求的全部費用
  9. Based on analysis of hang river ' s actuality in the lower yellow river and researches related with evaluation of dike breach risk, it is put forward that the influencing factors of hang river dike beach risk in the lower yellow river should involve 4 aspects, the locomotion of incoming water and sediment load, the regional crustal stability, the evolvement of river regime and the stability of river dikes. the evaluation indexes system of hang river dike breach risk and uniform synthetic model are established from the 4 aspects. with the support of gis technology, the evaluation indexes system and the model of multi - hierarchical fuzzy synthetic judgment are applied to estimating the dike beach risk of hang river in the lower yellow river under different flood conditions

    在對黃河下游懸河現狀、決風險評價有關研究進行分析的基礎上,本文提黃河下游懸河決風險的影響因素應當包含水沙運動、區域地殼穩定性、河勢演變和堤防穩定性4個方面,並從這4個方面建立了黃河下游懸河決風險評價的指標體系和統一的綜合評價模型;在gis的支持下,運用評價指標體系和多層次模糊綜合評判模型,對不同洪水情景下黃河下游懸河的決風險狀況進行了評價。
  10. Abstract : according to analyzing of all the factors concerned with the threatening degree of oil spill, it ' s proposed that weight of the factor s is ascertained by fuzzy nn. moreover, to ascertain the threatening degree and th e grade of the oil spill accident by fuzzy integrated evaluation has laid a foun dation for making oil spill emergency decision

    文摘:在綜合分析影響油事故威脅程度有關的諸多因素的基礎上,提使用模糊神經網路來確定各影響因素的權重,進而使用模糊綜合評價的方法來評定油事故的威脅程度及等級,為進一步的油事故應急決策奠定基礎。
  11. In chapter 4 we discuss the design of the high speed and high performance vlsi and its imp1ementation, firstly we ana1yze and compare the features and ru1es of al1 kinds of fft algorithm, adopt complex radix 4 butterfly calcu1ation as basic alu, then discuss all kinds of process architectures, the design thoughts, rule, method, technique way, the characteristics of the design are r4 dit algorithm, pingpong ram design method and pipeline structure between stages. we also analyze the limited word length effect and the method to avoid overflow of the fixed points fft process, bring out the expandable platform mode

    第四章主要討論了高速高性能的快速傅立葉變換處理器的設計和實現,首先分析和比較了各種快速傅立葉變換演算法的特性和規律,提基4蝶算的演算法具有最好的性價比,討論了順序、級聯、并行和陣列的處理結構,闡述了設計高速高性能快速傅立葉變換處理器時的設計原則、設計思路、所採用的路線,驗證並測試fft處理器,分析了定點fft處理過程由於有限字長效應所產生的量化誤差的范圍及防控制辦法,提了可擴展平臺模式。
  12. H. 26l / h. 264 is a new video compression standard provided by itu - t and iso / iec, which faces to very low rate video communication. it uses a new dct transform method as 4 * 4 integer dct. it can reduce block effect, while it is clear and easy to realizen, has high precision, computes fast and costs less memory

    H . 26l / h . 264是itu - t與iso / iec聯合提的一種較新的面向甚低碼率視頻通信應用的視頻圖像壓縮標準,採用了一些新的編碼,使用了新的dct變換方法: 4 4整型dct變換,該變換具有減小方塊效應,演算法明晰簡單、易於實現,運算結果精度高且不會,運算速度快,佔用內存小等優點。
  13. Based on current methods of anti - buffer overflow and the analysis of existing problems, the random fit algorithm was presented

    摘要對已有的防範及其存在的問題進行分析,提了一種基於隨機匹配演算法的堆防範策略。
  14. Discussing in the first place the origins of the ready - for - use advantage theory, looking into the basic issues related to the theory and referring to the assertions over this theory by scholars both at home and abroad, this paper gives a thorough and systematic analysis and generalization of the concepts of the theory. then, the formation mechanism of regional ready - for - use advantage is given detailed description and the role technical ready - for - use advantage and institutional ready - for - use advantage plays in developing regional economy is expounded

    本文認為: (一)在知識經濟和經濟全球化的背景下,資源與活動集聚因素形成,新生產要素和可持續發展觀念產生,模仿創新為后發區域經濟發展開拓了新的空間,提供了新的發展途徑,后發區域模仿創新經過引進復制、本地化、改進型階段的發展,產生「蛙跳」效應、追趕效應、復制效應和效應。
  15. Apart from these, the paper also proposes several improvements for pump control, which include changeable cut off control that can prevent several kinds of relief loss of hydraulic system, cross sensing control of pump that can enlarge the variable working range and compound control that combine two kinds of valve control method together

    此外,還提了幾種泵控改進方案,其中包括可防止多種系統流狀態的可變壓力切斷控制、能增大泵的變量工作范圍的交叉功率傳感控制以及將兩種閥控策略結合在一起的復合控制
  16. In this article, with the guidance of " 16th party congress " and fujian " tenth five - year plan ", the aid of pavitt innovation department category theory , production function model of cobb - douglas ( c - d ) and using sample statistical interpretation method , the author has studied features of technological innovation model as well as technological innovation spillover effects of industrial department of fujian

    本文以「十六大」精神和福建省「十五」綱要為指導,藉助帕維特( pavitt )創新部門分類理論和柯布?道格拉斯( c - d )生產函數模型,運用樣本統計分析方法,實證研究了福建工業產業部門創新模式以及產業間創新擴散效應的特點。
  17. 6. make some amendments to the daily logfile system : write the daily logging data to the memory using cache technology, mitigating the problem of dom insufficient space ; avoid logfile overflow by using daily log queue technology ; cope with repulsion problem of data logging and data sending

    6 .對日誌系統做了如下改進:使用cache,把日誌數據、寫在內存中,緩解了dom空間不足的問題;使用日誌隊列避免日誌;實現了日誌和日誌發送程序互斥的訪問日誌數據。
  18. This is best exemplified by the technique of taking control of c c based systems by using buffer overrun techniques

    使用緩沖區溢出技術來控制基於c / c + +的系統的是對這最好的例證。
  19. By providing a specially modified word 5. 0 document, a user could run malicious code by using a classic buffer overrun technique when the conversion utility processed it

    這樣,通過提供經特別修改的word 5 . 0文檔,一些用戶就可在轉換工具處理文檔時,使用傳統的緩沖區溢出技術運行某些具有破壞性的代碼。
  20. By providing a specially modified word document, a user could run malicious code by using a classic buffer overrun technique when the conversion utility processed it. more information about the vulnerability in the conversion utility can be found in the

    這樣,通過提供經特別修改的word 5 . 0文檔,一些用戶就可在轉換工具處理文檔時,使用傳統的緩沖區溢出技術運行某些具有破壞性的代碼。
分享友人