端點角度 的英文怎麼說

中文拼音 [duāndiǎnjiǎo]
端點角度 英文
end angle
  • : Ⅰ名詞1 (東西的頭) end; extremity 2 (事情的開頭) beginning 3 (門類; 方面) item; point 4 (原...
  • : Ⅰ名詞1 (液體的小滴) drop (of liquid) 2 (細小的痕跡) spot; dot; speck 3 (漢字的筆畫「、」)...
  • : 角Ⅰ名詞1 (牛、羊、 鹿等頭上長出的堅硬的東西) horn 2 (古時軍中吹的樂器) bugle; horn 3 (形狀像...
  • : 度動詞[書面語] (推測; 估計) surmise; estimate
  • 端點 : extreme point; [數學] end point; extremity; terminal; end端點檢測器 end point detector; 端點控制 ...
  • 角度 : 1. [數學] (角的大小) angle; the degree [size] of angle 2. (看事情的出發點) point of view; angle
  1. 3. a space bond slip relation of reinforcements in either end of a member is proposed, based on one - dimensional bond slip model of reinforcements proposed by teng zhiniirmg from tsinghua university, the first - time loaded ascending stage ? curve of which model is modified as the line which parameters are not changed so as to simply the computation. the bond, slip is regarded as the boundary nonlinearity of a member

    3 、採用清華大學滕智明建議的一維鋼筋粘結滑移恢復力模型,但從簡化計算的出發,將首次加載的上升段曲線改為直線,並假定構件部的諸多縱向鋼筋的滑移服從平截面假定,考慮由節錨固區粘結滑移引起的構件截面軸向和兩轉附加變形。
  2. For example, a straight line is specified by its two endpoints, and a rectangle is specified by a point giving the location of its upper - left corner and a pair of numbers giving its width and height

    例如,直線可通過它的兩個來指定,而矩形可通過確定其左上位置的並給出其寬和高的一對數字來指定。
  3. ( 2 ). according to the system indices and requirements together with the technology characteristic, it researches the capture possibility of apt capturing system. then it introduces the common scan methods, such as raster, spiral, raster spiral, rose and lissajo. ( 3 ). it makes a detailed simulation analysis of the raster and spiral scan, analyze the connection between capture probability, capture time, system index at different capture resolution angle, capture range, vibration angle extent and terminal location distributing mean square deviation

    其中對幾個關鍵部分進行了詳細分析:計算了目標反射器的激光雷達散射截面( lrcs )值,研究了qd與ccd對目標位置的計算方法和空間解析; ( 2 )根據系統指標和要求並結合現有國內技術特研究了apt捕獲系統掃描的捕獲概率問題,然後分析了幾種常見的掃描方式:矩形( raster )掃描、螺旋( spiral )掃描,矩形螺旋( rasterspiral )掃描,玫瑰形( rose )掃描以及李薩如形( lissajo )掃描; ( 3 )對分行掃描和螺旋掃描進行了詳細的模擬分析,分析了它們在不同捕獲分辨、捕獲范圍、振動振幅和終位置分佈均方差時的捕獲概率、捕獲時間與系統常數之間的關系。
  4. It was essential that the lifted girder could be moved by any angle. a hand drawn chain hoist was used instead of a steel wire rope to enable the girder to be moved freelyby any angle. the suspension centers should be kept far apart but to the front as much as possible

    起吊后的鋼梁靈活、方便的調整是關鍵,吊裝時用有足夠行程的手拉葫蘆代替鋼絲繩,以便進行調整,要求吊相距要大一些,而且吊盡量靠前
  5. The angle message from the sensor was conversed through the conversion of coordinates, and the termination of the bucket was obtained. after the continuous points were described in the coordinate system, the practical straight - line excavate tracer came

    光電編碼器採集到的信息,經坐標計算得到挖掘機鏟斗的坐標,將這些連續的坐標描,即得到一條實際的直線挖掘軌跡。
  6. Coinpe with talihonal analog tnulking system, tetra system is apter to boplemen digltal encrypon of speech and data, but system securiiy is unable to depertd sdriply on enctwon. from the point of view of the b1lbrmation system security arehithebe, the author classified and concltuled the tetra system seeurity and wuced sytw security bo the wts of thnd analysis, security requirements, security sehaces and security mangemen etc. 111e mechbosm of authentication, tem1ina enable and disabq air intn encrypion, end - bend encmption led in tewh is the key ler in this n to the security question of practical application, the re1evant wt w and m are provided too

    但是系統安全不能單純依靠加密來保證,作者從信息系統安全體系的,對tetra系統安全進行了分類歸納,從風險分析、安全需求、安全服務、安全管理等方面對tetra系統安全體系進行了閘述,並對tetra系統中主要應用的鑒權、終激活禁用、空中介面加密、加密等安個機制進行了重研究,同時針對實際應用中出現的安全性問題提出了解決方法。
  7. In the paper, the transmission power of section constituted by the assigned branch is seen as objective function, assigning the adjustable generators both in sending system and receiving system, assigning the faults set, including the constraint conditions such as the differences between the angles of rotor and the inertia center angel of the whole system, the thermal stability of branch and node voltage, obtaining the results by using interior - point solution and line - predominant jordan

    本文提出的考慮暫態穩定約束的可用輸電能力演算法是以指定線路組成的斷面的傳輸功率為目標函數,指定送系統和受系統中參考調節的發電機,指定故障集情況下,以發電機轉子相對全系統慣性中心的差、線路熱穩定、節電壓等構成約束條件,採用內法和行主元約當逐行消去法求解問題的最優解。
  8. In chapter 4, mathematical theory about related coefficient and fitting of straighten anti - curve line is introduced at the beginning of this chapter, then how to program to calculate related coefficient is introduced including discussing the appearance of straighten anti - curve line in bitmap, searching the ends of straighten anti - curve line, calculating the angle bitmap should be turned, calculating related coefficient after bitmap has been turned

    第4章首先介紹了有關相關系數以及直線擬合的數學理論,然後闡述了求解逆直線相關系數的編程思路,其中包括對逆直線在位圖中擺放方式的分類討論、逆直線的搜索、求解旋轉、旋轉后求解相關系數等幾個環節。
  9. This paper reviewed the progress of targeted therapy of cancer from points of view of western and chinese traditional medicine and clarified the multiple target effect of chinese materis medica of ant - angiogenesis of cancer, inducing apoptosis and inhibition of telomerase activity

    摘要從中西醫分別綜述腫瘤靶向治療的研究進展,闡述中藥在腫瘤治療中的抗腫瘤血管生成、誘導細胞凋亡和抑制粒酶活性的多靶效應。
  10. With regard to the flow regulation of the best - effort traffic, the controllable traffic in high speed computer communication networks, the present paper proposes a novel control theoretic approach that designs a proportional - integrative ( pi ) controller based on multi - rate sampling for congestion controlling. based on the traffic model of a single node and on system stability criterion, it is shown that this pi controller can regulate the source rate on the basis of the knowledge of buffer occupancy of the destination node in such a manner that the congestion - controlled network is asymptotically stable without oscillation in terms of the buffer occupancy of the destionation node ; and the steady value of queue length is consistent with the specified threshold value

    本文從控制理論的出發,針對計算機高速網際網路中最大服務交通流即能控交通流的調節問題提出了一種基於多速率采樣的具有比例積分( pi )控制器結構的擁塞控制理論和方法,在單個節的交通流的模型基礎上,運用控制理論中的系統穩定性分析方法,討論如何利用信終緩沖佔有量的比例加積分的反饋形式來調節信源節的能控交通流的輸入速率,從而使被控網路節的緩沖佔有量趨于穩定;同時使被控網路節的穩定隊列長逼近指定的門限值。
  11. In the third chapter, a new wireless data communication subsystem is designed, and it achieves higher speed than other ones. in the fourth chapter, the writer designed a new kind of remote measuring subsystem that consumes much lower power. in the fifth chapter, the engineering design of remote control subsystem is finished, and the reliability and security of the system is settled

    第三章論述了有關無線通信子系統設計的各個方面,突出解決了無線數據傳輸的速問題;在第四章里設計了遙測終子系統的軟硬體,較好地解決了降低功耗的問題;第五章從通用性的上,完成了遙控終工程設計的主要任務以及控制軟體的設計,重解決了系統的可靠性及安全性問題。
  12. Part 1 : a brief account of the crime obstructeclin this part, the author compared the appellations of the acts such as legal defense and so on, and put forward a new terms : the crime obstructed. this terms has merit as follows : in the first place, it is named in the point of view of the constitution of crime, so we can avert the abuse that people named them in the angle of criminal attribute, but studied them not in the part of criminal attribute ; secondly, it can integrate the fortuious event, the force majesture, the severe damages of people who has criminal incapacity that in traditional theories are studied in the interior of the constitution of crimes and the acts such as legal defence, etc., because they have a common ground : not to accord with the constitution of crimes. thirdly, it is accurate and lucid terms. besides appellation, the author discussed the concept and feature of the crime obstructed in this part

    該部分詳細比較了我國學者對以正當防衛為代表的一系列行為的稱謂,提出了「犯罪阻卻事由」這個新術語。並認為使用這一術語有如下優:一是從犯罪構成的來命名,避免了其他術語從犯罪屬性的命名但又不在犯罪屬性這部分來研究的弊;二是它能將傳統理論放在犯罪構成內部研究的意外事件、不可抗力與無刑事責任能力人的嚴重損害行為與正當防衛等統一起來,因為它們有一個共同:不符合犯罪構成;三是這個術語準確而又簡潔。除稱謂外,這部分還研究了犯罪阻卻事由的概念與特徵。
  13. The third chapter analyzes the characters and shortcomings in the pla ’ s diet self - support system from the systemic point. besides that, it also makes feasible analysis in some aspects such as the inner demands of pla ’ s construction and development, the basic attribute of military diet support, the influence of outer surroundings and so on

    第三章從系統分析了我軍飲食自我保障體系的特和弊,並從我軍建設與發展的內在要求、軍隊飲食保障的基本屬性、外部環境變化的影響等幾個方面對飲食社會化保障進行了可行性分析。
  14. Then, this thesis had analyzed current demand from the securities companies and the feature of existing data, designed the granularity model, dimension model, system structure and function module of data warehouse for securities companies. the author had detailed demonstrated the designing and realizing of multi - dimension dataset, data conversion module, manage and control module, multi - dimensional analysis module, demonstrated the analysis result to client terminal with the example of client transaction analysis. so to provide quick and effective reports and analysis to the decision makers of securities companies in multiple aspects, and upgrade the company ’ s market reaction speed and competitiveness

    其次,根據對券商現有需求及現有數據特的分析,對券商數據倉庫的粒模型、維模型、系統結構及功能模塊進行了設計,並以客戶交易分析主題為例詳細闡述了多維數據集的建立以及數據轉換模塊、管理控制模塊、多維分析模塊及多維數據前展示的實現,從多、多方位為券商決策人員提供了快速有效的各種分析報表,提高了企業的市場反應速和競爭力水平。
  15. In the application example of the model, a double monitor system platform is implemented, it monitors from two different views of operation screen of terminals - monitored and operation network packets, and implements a searching and locating module aiming at two different collecting data. the searching module provides a keyword searching algorithm about one dynamic character data of the operation picture, and improves the algorithm from getting string and choosing appropriate string matching algorithm. the locating module associates the two collecting data by localizer, which reappears the trade process of the terminals by focused operation data

    在該監控系統模型的應用實例中,實現了一個雙監控系統平臺,從受控終的操作畫面和業務網路數據包兩個不同的進行監控,並針對監控系統採集的兩類不同數據特,實現了一個搜索定位模塊,其中搜索模塊針對終畫面動態字元數據,提出了一種動態字元的關鍵字搜索演算法,並從文本串的獲取和字元串匹配演算法的選取兩方面對演算法進行改進,定位模塊通過一個定位器實現了兩類採集數據的關聯,即通過關注的業務數據可以再現現場的終操作交易過程。
  16. Following are detailed steps of this system : in the segmentation section, we use three successive frames to detect the motion infomation of the pictures, by using blockmatching algorithm in two successive frames twice, we can get two pictures composed of motion blocks of the moving object, then we find out the common motion blocks of the two pictures, experiments prove these blocks approximately compose the moving object. after getting the motion blocks, we calculate the center of these blocks as the center of the moving object, thus we can use the center point as the origin, construct n straight linesjoining the boundry of the image and the center. on each line, we can find out a proper point near the object contour according to some criteria, then we use these n points as the initial points of the snake and let the snake converge on the object contour, thus finish the segmentation of the moving object

    本方案的實現過程為:分割部分:對運動目標的前後三幀進行兩次塊匹配運動檢測,通過找出兩個匹配結果中運動圖像塊的公共部分,獲得組成運動目標的圖像塊;求出運動目標圖像塊的形心作為運動目標的中心,以此中心為,向四周發散出間隔為的n條射線,射線的另一終止於圖像的邊緣;在每條射線上按照一定的準則(的梯和與目標中心的距離在一定閾值范圍內)找出n個初始輪廓;以這些初始輪廓作為主動輪廓模型( snake )的初始,用改進的貪婪演算法使snake收斂到待分割的運動目標輪廓上。
  17. This series of articles about model - driven development focuses on using an end - to - end tooling perspective for the external claims assessor scenario in the merger of two companies

    這各關于模型驅動開發的系列文章,重放在從工具的研究兩個公司合併時的外部估損人場景。
  18. Analyzed life - span issues of every content, characteristic of stage to project, carry on the concrete exposition to quality, cost, progress three major meaning of control goal that carry throughout project especially, prove project life - span issues of every stage and systematic ness of the three control goals. combine traditional project a great deal of drawbacks that management mode have, theory and management inherit foundation of thought analyses and carry on project life - span issues of integrated necessity and feasibility of management in system. from project management two level, four stage and three major angle of control goal these, synthesize integrated concept, model, train of thought and implementation method after putting forward project management

    本文對工程項目管理在國內外的發展現狀、涵義及其系統性進行了總結;對工程項目壽命期各階段的內容、特進行了分析,並重對貫穿工程項目全過程的質量、成本、進三大控制目標進行了具體闡述;論證了工程項目兩個管理層次、壽命期各階段及三大控制目標之間的系統性;結合傳統工程項目管理模式存在的諸多弊,在系統論和管理集成思想的基礎上討論了進行工程項目綜合集成化管理的必要性和可行性;在前邊理論闡述的基礎上,從工程項目管理的兩個層次、四個階段以及三大控制目標的出發,提出了工程項目綜合集成化管理的概念、模型、思路和實現方法;最後,通過一個簡單的工程案例對本文提出的集成化管理模式的可行性進行了驗證。
  19. We deeply studied the requirement of the security email and the procedure of the transportation of emails over the network, and give out during the period that we worked on this subject, we first studied the status of the current internet email system and the requirement of security email in detail, then studied every period that the emails exist on the internet, the threats facing them, and the imaginable applications of the security email in real life. we have read many materials those relate to the security of information transporting on the internet, and we have refer to many network information security modules and experiences of the other email service providers. based on all of these, we give out a whole solution from the client side to the server side, we not only provide the confidential service for the email users, but also provide the signature, anti - deny and anti - impose security services

    在課題開發的過程中,我們首先深入詳細地調研了整個郵件系統的現狀以及對郵件安全的需求,然後從網路信息安全的,對郵件傳輸的各個環節、每個環節所面臨的安全隱患、以及安全郵件在現實生活中可能的應用進行了深入的研究,我們先後查閱了與網路信息安全郵件相關的大量文獻,參考了許多現有的網路信息安全模型,並且參照了現有其它郵件服務提供商的web安全郵件的一些安全做法,分析了它們系統的優缺;在此基礎上,結合中國的實際情況,我們提出了web安全郵件系統的從客戶到服務器完整的解決方案,方案中不僅為用戶提供了郵件保密性服務,還提供了郵件簽名,防抵賴,防篡改等安全業務,滿足了人們對郵件安全的迫切需要。
  20. Then, the rtl design of the module about contol transfer is emphasized. it mainly includes the out logic function, the in logic function, the special logic function and the configuration logic function

    然後從模塊的演算法級設計的,著重討論了控制傳輸模塊0的設計,主要包括輸出邏輯功能塊、輸入邏輯功能塊、特殊邏輯功能塊和配置邏輯功能塊。
分享友人