無效的鏈接 的英文怎麼說

中文拼音 [xiàodeliànjiē]
無效的鏈接 英文
bad chains
  • : 無Ⅰ動詞(沒有) not have; there is not; be without Ⅱ名詞1 (沒有) nothing; nil 2 (姓氏) a surn...
  • : Ⅰ名詞(效果; 功用) effect; efficiency; result Ⅱ動詞1 (仿效) imitate; follow the example of 2 ...
  • : 4次方是 The fourth power of 2 is direction
  • : Ⅰ名詞1. (鏈子) chain Ⅱ動詞(用鏈栓住) chain; enchain Ⅲ量詞(計量海洋上距離的長度單位) cable length
  • : Ⅰ動詞1 (靠近;接觸) come into contact with; come close to 2 (連接; 使連接) connect; join; put ...
  • 無效 : of no avail; to no avail; invalid; null and void; nullity (合同等的); in vain; unavailability; ...
  • 鏈接 : interlinkage; interlinking; [自動化] catenate;catenation; chaining
  1. Make sure that your links work and that you don ' t have broken links. there are free online tools that can help you with this

    確保性,避免出現,這時你可以利用網上免費工具。
  2. Jadeshine has been taken as one of the main suppliers in china of high - end ndt products and nde services, and the right channel and partner between international ndt brands and china market

    嘉盛科技以專精化為業務目標,已日益成為中國市場高端損檢測設備及服務主要供應商之一,也是國際損檢測品牌和中國市場渠道。
  3. In the models, the iron core nonlinearly of the traction transformer and the magnetic hysteresis effect without the b - h curve are considered. having tested by digital simulation, the winding parameter has not changed in the state of external fault or magnetizing inrush etc. but the winding parameter has obviously changed in state of inter fault or inter - turn fault. ( 3 ) the rules three phases converted to two phases of traction transformer in electric railways are developed in this paper

    ( 3 )利用牽引變壓器磁平衡方程,建立了基於系統辨識理論雙繞組單相線牽引變壓器、阻抗匹配平衡牽引變壓器及scott (斯科特)線牽引變壓器「灰箱」模型,該模型考慮了牽引變壓器鐵芯非線性和磁滯應,但又不直反映在模型中,並且需鐵芯b - h曲線數據。
  4. The first chapter of this paper analyses the background and meaning of the establishment of disciplines navigation system for network resources. with the rapid increase of network academic information resource, search engine as the web primary retrieval tool can " t meet the retrieval request of specialty information resources ; traditional cataloging techniques can " t meet the needs of magnanimous network academic resources ; most of the " navigation of networks " established by libraries are the simple link of websites. it lacks the necessary revelation and evaluation of resources content

    本文在第1章分析了網路資源學科導航系統建設背景和意義:隨著網路學術信息資源飛速增長,作為web主流檢索工具搜索引擎難以高、準確、全面地完成專業信息資源檢索請求;傳統編目技術也力承擔海量網路學術資源編目需求;圖書館所建「網海導航」多數為對網站(頁),缺乏對資源內容必要揭示與評價;國內對網路學術資源標準化研究也相對滯後於國外。
  5. For example, an attack used as bridge may buff the dread knight ' s damage but if used as finisher the length or power of the buff is increased

    例如,一個作為技能可以提高恐懼騎士傷害輸出但如果用作結束技則論持續時間或果都會增強。
  6. The linker issues a warning if the alignment produces an invalid image

    如果對方式產生圖像,則器發出警告。
  7. The selection and determination of the mode of operation or profit making are the perpetual subjects of an enterprise. when the value chain concept was raised and introduced into the business circle and the management area, it has gained wider and wider application, but more in - depth research is still lacking. even the initiator of this concept michael porter has no further systematic continuation

    由邁克爾?波特在1985年提出價值概念至今雖已歷經20年有餘,但在我國卻並未得到很好理解和應用,誤讀誤釋和誤用甚至濫用情況屢見不鮮,其中尤以一股腦兒把erp 、 tqm 、 bpr 、 crm 、 5s 、 6 、 jit 、 scm 、 amt以及其他「快速修理工具」當成價值構件做法貽害最甚,殊不知在企業/戰略事業價值底層作業及其作業間缺乏內在有條件下,採用這些所謂先進方法後果只能是更加重復、浪費甚至錯誤。
  8. At same time, it has perfect exception handling mechanism and can find hardware, wireless link and tcp connection exception efficiently with the help of hardware watch dog. it can backup data during exception period by backup link and resending mechanism ; can make the whole system run continuously and stably by exception handling. thus, limited hardware resources are saved

    同時設備具有完善異常監測機制,配合硬體看門狗能夠及時並有地發現硬體異常、路異常、 tcp連故障;通過備份路和重發機制,對發生異常期間數據進行有備份;通過異常處理機制使整個系統能夠持續、穩定地運行,並節省了寶貴系統硬體資源。
  9. Send the real - time position, velocity of the moving object. received by gps oem caxd, associaied with the status information of the vehicle devices, to the monitoring centef, by way of the mobile conununication network. the monitoring system, based on some gis software, displays the tracks of the mobile objects on the eiectronic map, and users could supervise and query their iaterested parameters such as the location or velocity of the vehicle, the general information of vehicles, as so on, so that provide bases for vehicle management, improve the efficiency, or assure vehicles against accidents

    車輛監控系統是its重要組成部分之一,它將全球衛星定位技術、地理信息技術( gis )和現代通信技術結合在一起,通過將裝有gps收機移動目標動態位置、速度、狀態等信息,實時地通過線通訊路傳送至監控中心,在具有強大地理信息查詢功能電子地圖上進行移動目標運動軌跡顯示,並可以對目標準確位置、速度、運動方向、車輛狀態等用戶感興趣參數進行監控和查詢,為調度管理提供可視化依據,提高車輛運營率,確保車輛安全。
  10. Providing a novel access scheme for solving “ last mile ” wideband access and global person communications. in wireless optical code multiple access ( w - ocdma ) network, media access control ( mac ) is a key issue, which determines network performance 、 bandwidth efficiency 、 complexity and cost of terminal

    線光碼分多址( w - ocdma )入網中,數據路層媒質入控制技術( mac )至關重要,它直影響網路性能、帶寬利用率、終端設備復雜度和成本。
  11. However, it seems that this product is no longer available for download. all the ibm links lead to nowhere

    但是,這種產品好像不再提供下載,所有ibm都是地址。
  12. Data link interface is the interfacebetween tactical control system and data link system of uav, it links general control unit anddifferent data link system of uav efficiently together, and is the key that realizes commonfunctionoftacticalcontrolsystem

    數據介面是戰術控制系統與人機數據系統之間介面,它有地將通用控制單元與不同人機數據在一起,是實現戰術控制系統通用功能關鍵。
  13. In addition, a squiggly line appears below the definition name, which could not be found, on the member shape to help you resolve the broken link

    此外,成員形狀中定義名稱下方將會顯示一條曲線(可能找不到) ,可以幫助您解決問題。
  14. 1 ) realization of software packet embedded in m - es and md - is respectively to accomplish main function of mdlp, including assignment of tei ( temporary equipment identifier ), establishment of multiple frame operation, framing, flow control and error - free transmission of packets, is detailed. 2 ) a test model is established to evaluate the robustness and stability of mdlp and verify the validity of software packets. 3 ) according to the design of radio modem construction used in m - es, the modules of interface between data terminal equipment and radio modem are achieved to enable transmission of short message and continuous pseudo - random bit stream via rs232 uart

    本文首先概述了蜂窩數字分組數據網結構和空中協議,詳細分析了移動數據路協議,並在此基礎上,重點敘述了以下方面工作: 1 )設計並完成了分別應用於m - es和md - is端線控制器兩套程序實現數據路層主要功能,包括分配臨時設備號、建立路、組幀和面向連服務保證分組正確誤地傳輸,並進行適當流控; 2 )建立測試模型測試移動數據路協議可靠性和穩定性,證明了程序包用; 3 )根據cdpd系統線數據機軟硬體總體設計方案,完成了介面模塊,實現了rs232異步串口通信,使用戶可以根據需要發送短消息或連續偽隨機比特流; 4 )在tms320c54x軟體、硬體模擬平臺上,建立了cdpd試驗模型,實現了cdpd系統mdlp基本功能。
  15. Exclusion standard, search strategy and design of the search algorithm are given in detail. a latest update strategy, which is able to examine, download and renew the information in the shortest time, is proposed. the invalid hyperlinks are decreased sharply and the retrieval performance of search engines is improved

    Robot程序是信息搜集與信息更新基礎,本文詳細地敘述了其搜集信息排除標準、搜索策略及搜索演算法設計,並給出了一個最近更新策略,保證能在數據信息變更最短時間內進行檢測、下載、更新,大大地避免死,提高了搜索引擎查詢性能。
  16. According our perfect service system, we can link up all kinds of cold train procedures by high efficiency, exactly system that protects cargo in the best storage environment

    完善服務體系,我們系統可以為客戶高、精確、各種冷業務流程,自動保障庫內貨物最佳存儲環境。
  17. The constraint enforces referential integrity by guaranteeing that changes cannot be made to data in the primary key table if those changes invalidate the link to data in the foreign key table

    如果主鍵表中數據更改使之與外鍵表中數據,則這種更改將法實現,從而確保了引用完整性。
分享友人